ExamPrep Notes Flashcards

1
Q

Control Function Planning

A

(1) Efficient and effective use of the resources

(2) Upgrades and modification to system’s process to meet management’s goals and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Control Function Reviewing

A

(1) Audit logs and user activities

(2) Changes to operation schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Control Function Detecting

A

(1) Unauthorized access attempts

(2) Incidents and problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control Function Monitoring

A

(1) System performance
(2) Environmental control to make sure variables such as temperature and humidity are set to maintain the proper conditions for equipment
(3) Vulnerabilities discovered and addressed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Control Function Limiting

A

(1) Physical access to those who have a need

(2) Logical access to code and applications to those who have a need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control Function Ensuring

A

(1) Backup so that operations can be recovered in a timely fashion
(2) Detailed schedules for operations employees working on all shifts
(3) Job accountability and adequate audit records collected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some common types of SLAs include the following:

A

(1) Uptime agreements (UAs)—UAs are one of the most well-known type of SLA. UAs detail the agreed-on amount of uptime. As an example, these can be used for network services, such as a WAN link or equipment-like servers.
(2) Time service factor (TSF)—The TSF is the percentage of help desk or response calls answered within a given time.
(3) Abandon rate (AR)—The AR is the number of callers that hang up while waiting for a service representative to answer.
(4) First call resolution (FCR)—The FCR is the number of resolutions that are made on the first call and that do not require the user to call back to the help desk to follow up or seek additional measures for resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IS operations are responsible for

A

(1) monitoring resources,
(2) incident/problem handling,
(3) infrastructure operations,
(4) help desk and support, and
(5) change management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lights-Out Operations

A

Lights-out operations can take place without human interaction. These include job scheduling, report generation, report balancing, and backup.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If there is a downside to all this logging, it is that all the information must be recorded and reviewed. Reviewing it can be expedited by using ________ _______ _________. These tools parse the data and eliminate unneeded information.

A

audit reduction tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As example of _________ ___________ __________ if an employee normally enters the building around 8 a.m. and leaves about 5 p.m., but now is seen entering the building at 3 a.m., a variance detection tool can detect this abnormality.

A

variance detection tool,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Another useful tool for an auditor is a variance detection tool, which

A

looks for trends that fall outside the realm of normal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Keystroke Monitoring

A

Capturing a user’s keystrokes for later review is an example of monitoring. Users need to be made aware of such activities through acceptable use policies and warning banners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The time between when an incident occurs and when it is addressed is called the ___________ _________. Incident handling should look at ways to reduce the delay window to the smallest value possible.

A

delay window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Auditing Problem Reports - The auditor should know to

A

review the problem log to verify that problems are being resolved. Auditors must also check to see that the most appropriate department or individual is handling the problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

STEP BY STEP

Troubleshooting Connectivity Problems

A
  1. Do you have connectivity to the web? Can you access the company webserver at http://192.168.1.254?
  2. Can you ping 192.168.1.254? (Yes/No)
  3. Can you verify that the network cable is attached to your computer and is connected to the wall jack? (Yes/No)
  4. Open a command prompt and enter ipconfig/all. Can you please read off the settings? (Yes/No)
  5. Click Start, Settings, Control Panel, Network Connections, Local Area Network Connection. Next select the Properties button. Now double-click on Internet Protocol. Please read off the values listed in each field. Are these correct? (Yes/No)
  6. All obvious checks have been completed and the problem has not been resolved. Refer problem to Level 2 response.
17
Q

Common teams include the following:

A

. Deskside team—Responsible for desktops and laptops
. Network team—Responsible for network issues
. Application software team—Responsible for application issues
. Printer team—Responsible for printers and printer-related problems
. Telecom team—Responsible for VoIP systems, PBX, voice mail, modems, and fax machines

18
Q

CPUs have two primary components:

A

. The arithmetic logic unit—Computations are performed here, in the brain of the CPU.
. The control unit—This unit handles the sequence of operations for the CPU and is also responsible for the retrieval of instructions and data.

19
Q

The CPU

A

The CPU consists of the control unit, the arithmetic logic unit, and registers. The arithmetic unit performs computations and is the brain of the CPU.

20
Q

CPUs can be classified according to several categories, based on their functionality:

A

. Multiprogramming—The CPU can interleave two or more programs for execution at any one time.
. Multitasking—The CPU can perform one or more tasks or subtasks at a time.
. Multiprocessor—The computer has the support for more than one CPU. As an example, Windows 95 does not support the multiprocessor, but Windows Longhorn does.

21
Q

Some common types of ROM include the following:

A

. Erasable Programmable Read-Only Memory (EPROM)
. Electrically Erasable Programmable Read-Only Memory (EEPROM)
. Flash memory
. Programmable logic devices (PLD)

22
Q

Some common bus architectures follow:

A

. The ISA bus—The Industry Standard Architecture (ISA) bus started as an 8-bit bus designed for IBM PCs. It is now obsolete.
. The PCI bus—The Peripheral Component Interface (PCI) bus was developed by Intel and served as a replacement for the ISA and other bus standards.
. The SCSI bus—The Small Computer Systems Interface (SCSI) bus allows a variety of devices to be daisy-chained off a single controller. Many servers use the SCSI bus for their preferred hard drive solution.

23
Q

The best way to prevent problems is to monitor current activity. Monitoring should include the following:

A

. Availability reports—These reports indicate availability. The key to these reports is determining when and why resources are unavailable.
. Hardware error reports—These reports indicate hardware problems and can be used to look for recurring problems.
. Utilization reports—These reports look at overall usage and can be used to help plan needed upgrades to the infrastructure.

24
Q

Utilization- CISA candidates should know that utilization rates above 95% require

A

attention to determine needed upgrades and that short-term fixes might include countermeasures such as reducing unneeded activities or shifting schedules so that some activities take place at less demanding times, such as the late-night or second shift.

25
Q

Capacity management provides the capability to monitor and measure usage in real time and forecast future needs before they are required. Capacity management requires

A

analyzing current utilization, past performance, and capacity changes

26
Q

Sandbox Scheme

A

A sandbox scheme is a software security mechanism designed to limit the the ability of untrusted code. This allows programs from unknown or untrusted vendors to be executed on a system without the fear that the programs will access privileged commands.

27
Q

Decompilers

A

When a programmer writes programs to be sold to the public, the source code normally is not provided. Decompilers can analyze the compiled code and rebuild the original source code. The soft- ware license might prohibit decompiling, but unscrupulous competitors or software hackers might still attempt it.

28
Q

Supervisory Mode CISA candidates should know that any user allowed to run programs in kernel mode can

A

bypass any type of security mechanism and gain complete control of the system. Many system utilities run in supervisory mode and should be under strict control.

29
Q

Information Leakage Security issues are possible with sensitive data written to

A

swap that becomes accessible to non-supervisor users.

30
Q

Site Licensing The CISA exam might ask you about ways to reduce illegal usage of software. One useful control to prevent unlawful duplication of software on multiple computers at a company’s site is

A

to purchase site licensing. This allows the software to be loaded on as many computers as needed at the organization.