Domain 5 Practice Questions Flashcards

1
Q

An IS auditor reviewing the configuration of a signature-based IDS would be MOST concerned if which of the following is discovered?

A

Auto-update is turned off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following BEST provides access control to payroll data being processed on a local server?

A

Using software that restricts access rules to authorized staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IS auditor has just completed a review of an organization that has a mainframe computer and two database servers where all production data reside. Which of the following weaknesses would be considered the MOST serious?

A

Password controls are not administered over the two database servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An organization is proposing to install a single sign-on facility giving access to all systems. The organization should be aware that:

A

Maximum unauthorized access would be possible if a password is disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When reviewing an implementation of a Voice-over IP system over a corporate wide area network, an IS auditor should expect to find:

A

Traffic engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An insurance company is using public cloud computing for one of its critical applications to reduce costs. Which of the following would be of MOST concern to the IS auditor?

A

The data in the shared environment being accessed by other companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following BEST determines whether complete encryption and authentication protocols for protecting information while being transmitted exist?

A

Work is being done in tunnel mode with the nested services of authentication header (AH) and encapsulating security payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following concerns about the security of an electronic message would be addressed by a digital signature?

A

Alteration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following characterizes a DDoS attack?

A

Central initiation of intermediary computers to direct simultaneous spurious message traffic at a specified target site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the MOST effective preventive antivirus control?

A

An online antivirus scan with up to date virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly