MY CISA Flashcards
Accountability for the maintenance of appropriate security measures over information assets resides with the:
Management should ensure that all information assets (data and systems) have an appointed owner who makes decisions about classification and access rights. System owners typically delegate day-to-day custodianship to the systems delivery/operations group and security responsibilities to a security administrator. Owners, however, remain accountable for the maintenance of appropriate security measures.
An ADVANTAGE of the use of hot sites as a backup alternative is that:
Hot sites can be made ready for operation normally within hours. However, the use of hot sites is expensive, should not be considered as a long-term solution, and requires that equipment and systems software be compatible with the primary installation being backed up.
An advantage of using unshielded twisted-pair (UTP) cable for data communication over other copper- based cables is that UTP cable:
The use of UTP in copper will reduce the likelihood of crosstalk. While the twisted nature of the media will reduce sensitivity to electromagnetic disturbances, an unshielded copper wire does not provide adequate protection against wiretapping. Attenuation sets in if copper twisted-pair cable is used for longer than 100 meters, necessitating the use of a repeater. The tools and techniques to install UTP are not simpler or easier than other copper-based cables.
After a disaster declaration, the media CREATION date at a warm recovery site is based on the:
RPO
RPO is determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interruption. The media creation date will reflect the point to which data are to be restored or the RPO.
After a full operational contingency test, an IS auditor performs a review of the recovery steps. The IS auditor concludes that the time it took for the technological environment and systems to return to full-functioning exceeded the required critical recovery time. Which of the following should the IS auditor recommend?
(1) Performing an exhaustive review of the recovery tasks would be appropriate to identify the way these tasks were performed
(2) identify the time allocated to each of the steps required to accomplish recovery
(3) AND determine where adjustments can be made.
Analysis and resolution ARE PERFORMED AFTER
logging and triage have been performed.
Atomicity GUARANTEES
that either the ENTIRE transaction is processed or NONE of it is
Authorization tables ARE USED TO VERIFY
implementation of logical access controls
Availability reports INACTIVITY, such as DOWNTIME, and provides
the time periods during which the computer was available for utilization by users or other processes
A benefit of Quality of Service (QoS) is that the PARTICIPATING APPLICATIONS
will have bandwidth guaranteed.
The BEST audit procedure to determine if unauthorized changes have been made to production code is to:
EXAMINE CHANGE CONTROL RECORDS AND COMPARE TO OBJECT CODE
The procedure of examining object code files to establish instances of code changes and tracing these back to change control system records is a substantive test that directly addresses the risk of unauthorized code changes.
The BEST audit procedure to determine if unauthorized changes have been made to production code is to:
examine object code to find instances of changes and trace them back to change control records.
Check digits DETECT
transposition and transcription errors.
Commitment and rollback controls ARE DIRECTLY RELEVANT TO
integrity.
These controls ensure that database operations that form a logical transaction unit will complete in its entirety or not at all.. Rollback ensures that the already completed processing is reversed back, and the data already processed are not saved to the disk in the event of the failure of the completion of the transaction processing.
CONCURRENCY control is a database management systems (DBMS) concept that is used to address CONFLICTS
with the simultaneous accessing or altering of data that can occur with a multi-user system.
Configuration management is widely accepted as on of the KEY COMPONENTS of
any network, since it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance.
Consistency ENSURES that the database is
in a legal state when the transaction begins and ends.
A contingency plan deals with ways to RECOVER from an unexpected failure, but it DOES NOT
address the identification or prevention of cyberattacks.
A continuity of operations plan (COOP)
addresses the subset of an organization’s missions that are deemed most critical and contains procedures to sustain these functions at an alternate site for a short time period.
Cross-site scripting (CSS) involves the COMPROMISE of the web page to
redirect users to content on the attacker web site.
A Cyclic Redundancy Check (CRC) is commonly used to determine the:
accuracy of blocks of data transfers, such as data transfer from hard disks, is validated by a CRC
Determining the Service Delivery Objective (SDO) should be based PRIMARILY on:
BUSINESS NEED.
The SDO is the level of service to be reached during the alternate process mode until the normal situation is restored. This is directly related to the business needs.
A disaster recovery plan for an organization’s financial system specifies that the Recovery Point Objective (RPO) is zero and the Recovery Time Objective (RTO) is 72 hours. Which of the following is the MOST cost-effective solution?
The synchronous copy of the storage achieves the RPO, and a warm site operational in 48 hours meets the required RTO.
Asynchronous updates of the database in distributed locations do not meet the RPO.
Synchronous updates of the data and standby active systems in a hot site meet the RPO and RTO requirements but are more costly than a warm site solution.
A DISASTER RECOVERY PLAN (DRP) test should test
(1) the plan,
(2) processes
(3) people
(4) and IT systems.
Durability GUARANTEES
that a successful transaction will persist, and cannot be undone.
During a disaster recovery test, an IS auditor observes that the performance of the disaster recovery site’s server is slow. To find the ROOT cause of this, the IS auditor should FIRST review the:
(1) configurations and alignment of the primary and disaster recovery sites.
During a disaster recovery test, an IS auditor observes that the performance of the disaster recovery site’s server is slow. To find the root cause of this, the IS auditor should FIRST review the:
Since the configuration of the system is the most probable cause, the IS auditor should review that first. If the issue cannot be clarified, the IS auditor should then review the event error log. The disaster recovery test plan and the DRP would not contain information about the system configuration.
During a fieldwork observation of system administrative functions, an IS auditor discovered that changes made to the database after normal working hours required only an abbreviated number of steps compared to those made during normal working hours. Which of the following would be considered an adequate set of COMPENSATING controls?
The use of a DBA user account is normally set up to log all changes made and is most appropriate for changes made outside of normal working hours. The use of a log allows changes to be reviewed.
During an application audit, the IS auditor finds several problems related to corrupted data in the database. Which of the following is a CORRECTIVE control that the IS auditor should recommend?
Proceeding with Restore Procedures is a corrective control.
During an application audit, the IS auditor finds several problems related to corrupted data in the database. Which of the following is a corrective control that the IS auditor should recommend?
Proceed with restore procedures.
During fieldwork, an IS auditor experienced a system crash caused by a security patch installation. To provide reasonable assurance that this event will not recur, the IS auditor should ensure that:
The change management process, which would include procedures regarding implementing changes during production hours, helps to ensure that this type of event does not recur.
An IS auditor should review the change management process, including patch management procedures, to verify that the process has adequate controls and to make suggestions accordingly.
While system administrators would normally install patches and patches would normally undergo testing, it is more important that changes be made during non-production times;
Furthermore, parallel testing is not appropriate for security patches because some servers would still be vulnerable.
An approval process could not directly prevent this type of incident from happening.
An Echo Check is
a quality check and error-control technique for data transferred over a computer network or other communications link, in which the data received is stored and also transmitted back to its point of origin, where it is compared with the original data.
An e-commerce organization with a complex technological environment has numerous concurrent projects. This often results in production system changes. What is the MOST suitable approach to managing system changes so that system outages are minimized?
COORDINATED RELEASE management across projects and systems.
Coordinated release management across projects and systems is a suitable strategy to employ in a complicated, dynamic system environment. Under this option, changes are packaged into releases that are implemented according to a predetermined schedule. Determining what changes are included in a release can be done in accordance with business and technical priorities. With release management, the emphasis is on coordinating changes stemming from multiple sources that impact multiple interconnected systems. This approach should lower technical risk and reduce the potential for system outage.
ETL
part of a business intelligence system, dedicated to extracting operational or production data, transforming that data and loading them to a central repository (data warehouse or data mart);
ETL does not correlate data or produce reports, and normally it does not have extractors to read log file formats.
Filters
allow for some basic isolation of network traffic based on the destination addresses
Firewalls
are a collection of computer and network equipment used to allow communications to flow out of the organization and restrict communications flowing into the organization.
The FIRST step in the execution of a problem management mechanism should be:
EXCEPTION reporting.
For a mission-critical application with a low recovery time objective (RTO), the IS auditor would recommend the use of which of the following recovery strategies?
Redundant site.
The frequent updating of which of the following is key to the continued effectiveness of a disaster recovery plan (DRP)?
PERSONNEL LIST
In the event of a disaster, it is important to have a current updated list of personnel who are key to the operation of the plan
The frequent updating of which of the following is key to the continued effectiveness of a disaster recovery plan (DRP)?
In the event of a disaster, it is important to have a current updated list of personnel who are key to the operation of the plan.
Hardware error reports
provide information to aid in detecting hardware failures and initiating corrective action
A hot site should be implemented as a recovery strategy when the:
provide information to aid in detecting hardware failures and initiating corrective action disaster tolerance is low.