CHAPTER 5 - CISA

CHAPTER 5 - CISA

Professional Development

15 Qs

quiz-placeholder

Similar activities

Identifying Malware

Identifying Malware

Professional Development

10 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

#02 Incident Response, BC, and DR Concepts

#02 Incident Response, BC, and DR Concepts

Professional Development

10 Qs

Security

Security

University - Professional Development

20 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

Sec Practice Quiz

Sec Practice Quiz

Professional Development

15 Qs

AWS ACF Módulo 4 - Segurança na nuvem

AWS ACF Módulo 4 - Segurança na nuvem

Professional Development

19 Qs

CHAPTER 5 - CISA

CHAPTER 5 - CISA

Assessment

Quiz

Computers

Professional Development

Hard

Created by

PT DATA

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-1) A fire sprinkler system has water in its pipes, and sprinkler heads emit water only

if the ambient temperature reaches 220°F. What type of system is this?

Deluge

Post-action

Wet Pipe

Pre-Action

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-2) An organization is building a data center in an area frequented by power outages.

The organization cannot tolerate power outages. What power system controls

should be selected?

Uninterruptible power supply and electric generator

Uninterruptible power supply and batteries

Electric generator

Electric generator and line conditioning

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-3) An auditor has discovered several errors in user account management: many

terminated employees’ computer accounts are still active. What is the best course

of action?

Improve the employee termination process.

Shift responsibility for employee terminations to another group.

Audit the process more frequently.

Improve the employee termination process and audit the process more

frequently.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-4) An auditor has discovered that several administrators in an application share an

administrative account. What course of action should the auditor recommend?

Implement activity logging on the administrative account

Use several named administrative accounts that are not shared.

Implement a host-based intrusion detection system.

Require each administrator to sign nondisclosure and acceptable-use

agreements.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-5) An organization that has experienced a sudden increase in its long-distance

charges has asked an auditor to investigate. What activity is the auditor likely to

suspect is responsible for this?

A. Employees making more long-distance calls

B. Toll fraud

C. PBX malfunction

D. Malware in the PBX

Employees making more long-distance calls

Toll fraud

PBX malfunction

Malware in the PBX

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-6) An auditor is examining a key management process and has found that the

IT department is not following its split-custody procedure. What is the likely

result of this failure?

One or more individuals are in possession of the entire password for an

encryption key.

One or more individuals are in possession of encrypted files.

Backup tapes are not being stored at an off-site facility.

Two or more employees are sharing an administrative account.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

(C-5-7) A developer is updating an application that saves passwords in plaintext. What is

the best method for securely storing passwords?

Encrypted with each user’s public key

Encrypted with a public key

Encrypted with a private key

Hashed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?