Download New Updated (July) Isaca CISA Actual Test 621-630

Ensurepass

 

QUESTION 621

A review of wide area network (WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:

 

A.

analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.

B.

WAN capacity is adequate for the maximum traffic demands since saturation has not been reached.

C.

the line should immediately be replaced by one with a larger capacity to provide approximately 85 percent saturation.

D.

users should be instructed to reduce their traffic demands or distribute them across all service hours to flatten bandwidth consumption.

 

Correct Answer: A

Explanation:

The peak at 96 percent could be the result of a one-off incident, e.g., a user downloading a large amount of data; therefore, analysis to establish whether this is a regular pattern and what causes this behavior should be carried out before expenditure on a larger line capacity is recommended. Since the link provides for a standby database, a short loss of this service should be acceptable. If the peak is established to be a regular occurrence without any other opportunities for mitigation (usage of bandwidth reservation protocol, or other types of prioritizing network traffic), the line should be replaced as there is the risk of loss of service as the traffic approaches 100 percent. If, however, the peak is a one-off or can be put in othertime frames, then user education may be an option.

 

 

QUESTION 622

An IS auditor examining the configuration of an operating system to verify the controls should review the:

 

A.

transaction logs.

B.

authorization tables.

C.

parameter settings.

D.

routing tables.

 

Correct A
nswer:
C

Explanation:

Parameters allow a standard piece of software to be customized for diverse environments and are important in determining how a system runs. The parameter settings should be appropriate to an organization’s workload and control environment, improper implementation and/or monitoring of operating systems can result in undetected errors and corruption of the data being processed, as well as lead to unauthorized access and inaccurate logging of system usage. Transaction logs are used to analyze transactions in master and/or transaction files. Authorization tables are used to verify implementation of logical access controls and will not be of much help when reviewing control features of an operating system. Routing tables do not contain information about the operating system and, therefore, provide no information to aid in the evaluation of controls.

 

 

QUESTION 623

Which of the following is a feature of Wi-Fi Protected Access (WPA) in wireless networks?

 

A.

Session keys are dynamic

B.

Private symmetric keys are used

C.

Keys are static and shared

D.

Source addresses are not encrypted or authenticated

 

Correct Answer: A

Explanation:

WPA uses dynamic session keys, achieving stronger encryption than wireless encryption privacy (WEP), which operates with static keys (same key is used for everyone in the wireless network). All other choices are weaknesses of WEP.

 

 

QUESTION 624

Time constraints and expanded needs have been found by an IS auditor to be the root causes for recent violations of corporate data definition standards in a new business intelligence project. Which of the following is the MOST appropriate suggestion for an auditor to make?

 

A.

Achieve standards alignment through an increase of resources devoted to the project

B.

Align the data definition standards after completion of the project

C.

Delay the project until compliance with standards can be achieved

D.

Enforce standard compliance by adopting punitive measures against violators

 

Correct Answer: A

Explanation:

Provided that data architecture, technical, and operational requirements are sufficiently documented, the alignment to standards could be treated as a specific work package assigned to new project resources. The usage of nonstandard data definitionswould lower the efficiency of the new development, and increase the risk of errors in critical business decisions. To change data definition standards after project conclusion (choice B) is risky and is not a viable solution. On the other hand, punishing the violators (choice D) or delaying the project (choice C) would be an inappropriate suggestion because of the likely damage to the entire project profitability.

 

 

QUESTION 625

The most likely error to occur when implementing a firewall is:

 

A.

incorrectly configuring the access lists.

B.

compromising the passwords due to social engineering.

C.

connecting a modem to the computers in the network.

D.

inadequately protecting the network and server from virus attacks.

 

Correct Answer: A

Explanation:

An updated and flawless access list is a significant challenge and, therefore, has the greatest chance for errors at the time of the initial installation. Passwords do not apply to firewalls, a modem bypasses a firewall and a virus attack is not an element in implementing a firewall.

QUESTION 626

The BEST way to minimize the risk of communication failures in an e-commerce environment would be to use:

 

A.

compression software to minimize transmission duration.

B.

functional or message acknowledgments.

C.

a packet-filtering firewall to reroute messages.

D.

leased asynchronous transfer mode lines.

 

Correct Answer: D

Explanation:

Leased asynchronous transfer mode lines are a way to avoid using public and shared infrastructures from the carrier or Internet service provider that have a greater number of communication failures. Choice A, compression software, is a valid way to reduce the problem, but is not as good as leased asynchronous transfer mode lines. Choice B is a control based on higher protocol layers and helps if communication lines are introducing noise, but not if a link is down. Choice C, a packet-filtering firewall, does not reroute messages.

 

 

QUESTION 627

Which of the following is a network diagnostic tool that monitors and records network information?

 

A.

Online monitor

B.

Downtime report

C.

Help desk report

D.

Protocol analyzer

 

Correct Answer: D

Explanation:

Protocol analyzers are network diagnostic tools that monitor and record network information from packets traveling in the link to which the analyzer is attached. Online monitors (choice A) measure telecommunications transmissions and determine whether transmissions were accurate and complete. Downtime reports (choice B) track the availability of telecommunication lines and circuits. Help desk reports (choice C) are prepared by the help desk, which is staffed or supported by IS technical support personnel trained to handle problems occurring during the course of IS operations.

 

 

QUESTION 628

Vendors have released patches fixing security flaws in their software. Which of the following should an IS auditor recommend in this situation?

 

A.

Assess the impact of patches prior to installation.

B.

Ask the vendors for a new software version with all fixes included.

C.

install the security patch immediately.

D.

Decline to deal with these vendors in the future.

 

Correct Answer: A

Explanation:

The effect of installing the patch should be immediately evaluated and installation should occur based on the results of the evaluation. To install the patch without knowing what it might affect could easily cause problems. New software versions withall fixes included are not always available and a full installation could be time consuming. Declining to deal with vendors does not take care of the flaw.

QUESTION 629

The MAIN reason for requiring that all computer clocks across an organization be synchronized is to:

 

A.

prevent omission or duplication of transactions.

B.

ensure smooth data transition from client machines to servers.

C.

ensure that e-mail messages have accurate time stamps.

D.

support the incident investigation process.

 

Correct Answer: D

Explanation:

During an investigation of incidents, audit logs are used as evidence, and the time stamp information in them is useful. If the clocks are not synchronized, investigations will be more difficult because a time line of events might not be easily established. Time-stamping a transaction has nothing to do with the update itself. Therefore, the possibility of omission or duplication of transactions does not exist. Data transfer has nothing to do with the time stamp. While the time stamp on an e-mailmay not be accurate, this is not a significant issue.

 

 

QUESTION 630

Which of the following applet intrusion issues poses the GREATEST risk of disruption to an organization?

 

A.

A program that deposits a virus on a client machine

B.

Applets recording keystrokes and, therefore, passwords< /font>

C.

Downloaded code that reads files on a client’s hard drive

D.

Applets opening connections from the client machine

 

Correct Answer: D

Explanation:

An applet is a program downloaded from a web server to the client, usually through a web browser that provides functionality for database access, interactive web pages and communications with other users. Applets opening connections from the client machine to other machines on the network and damaging those machines, as a denial-of-service attack, pose the greatest threat to an organization and could disrupt business continuity. A program that deposits a virus on a client machine is referred toas a malicious attack (i.e., specifically meant to cause harm to a client machine), but may not necessarily result in a disruption of service. Applets that record keystrokes, and therefore, passwords, and downloaded code that reads files on a client’s hard drive relate more to organizational privacy issues, and although significant, are less likely to cause a significant disruption of service.

 

Free VCE & PDF File for Isaca CISA Real Exam

Instant Access to Free VCE Files: CompTIA | VMware | SAP …
Instant Access to Free PDF Files: CompTIA | VMware | SAP …

This entry was posted in CISA Real Tests (July) and tagged , , , , , , . Bookmark the permalink.