100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CISA Exam – Questions Answered With Expert Insights

Beoordeling
-
Verkocht
-
Pagina's
174
Cijfer
A+
Geüpload op
07-01-2026
Geschreven in
2025/2026

CISA Exam – Questions Answered With Expert Insights

Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CISA - Certified Information Systems Auditor
Vak
CISA - Certified Information Systems Auditor

Documentinformatie

Geüpload op
7 januari 2026
Aantal pagina's
174
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CISA Exam – Questions Answered With Expert
Insights

Save




Terms in this set (208)



In a public key infrastructure (PKI), You are correct, the answer is A.
which of the following may be relied
upon to prove that an online
transaction was authorized by a A. Nonrepudiation, achieved through the use of
specific customer? digital signatures, prevents the senders from later
denying that they generated and sent the message.
Correct A. Nonrepudiation
B. Encryption may protect the data transmitted over
B. Encryption the Internet, but may not prove that the transactions
were made.
C. Authentication
C. Authentication is necessary to establish the
D. Integrity identification of all parties to a communication.


. D. Integrity ensures that transactions are accurate but
does not provide the identification of the customer

,Which of the following BEST ensures You are correct, the answer is C.
the integrity of a server's operating
system (OS)?
A. Protecting the server in a secure location is a
A. Protecting the server in a secure good practice, but does not ensure that a user will
location not try to exploit logical vulnerabilities and
compromise the operating system (OS).
B. Setting a boot password
B. Setting a boot password is a good practice, but
Correct C. Hardening the server does not ensure that a user will not try to exploit
configuration logical vulnerabilities and compromise the OS.


D. Implementing activity logging C. Hardening a system means to configure it in the
most secure manner (install latest security patches,
properly define access authorization for users and
administrators, disable insecure options and uninstall
unused services) to prevent nonprivileged users from
gaining the right to execute privileged instructions
and, thus, take control of the entire machine,
jeopardizing the integrity of the OS.


D. Activity logging has two weaknesses in this
scenario—it is a detective control (not a preventive
one), and the attacker who already gained privileged
access can modify logs or disable them.

,The IS auditor is reviewing an You answered B. The correct answer is D.
organization's human resources (HR)
database implementation. The IS
auditor discovers that the database A. Digital signatures are used for authentication and
servers are clustered for high nonrepudiation, and are not commonly used in
availability, all default database databases. As a result, this is not an area in which the
accounts have been removed and IS auditor should investigate.
database audit logs are kept and
reviewed on a weekly basis. What B. A nonce is defined as a "parameter that changes
other area should the IS auditor check over time" and is similar to a number generated to
to ensure that the databases are authenticate one specific user session. Nonces are
appropriately secured? not related to database security (they are commonly
used in encryption schemes).
A. Database digital signatures
C. A media access control (MAC) address is the
Incorrect B. Database encryption hardware address of a network interface. MAC
nonces and other variables address authentication is sometimes used with
wireless local area network (WLAN) technology, but
C. Database media access control is not related to database security.
(MAC) address authentication
D. When a database is opened, many of its
D. Database initialization parameters configuration options are governed by initialization
parameters. These parameters are usually governed
by a file ("init.ora" in the case of Oracle DBMS), which
contains many settings. The system initialization
parameters address many "global" database settings,
including authentication, remote access and other
critical security areas. To effectively audit a database
implementation, the IS auditor must examine the
database initialization parameters.

, Which of the following processes will You answered C. The correct answer is B.
be MOST effective in reducing the risk
that unauthorized software on a
backup server is distributed to the A. Even if replication is be conducted manually with
production server? due care, there still remains a risk to copying
unauthorized software from one server to another.
A. Manually copy files to accomplish
replication. B. It is common practice for software changes to be
tracked and controlled using version control
B. Review changes in the software software. An IS auditor should review reports or logs
version control system. from this system to identify the software that is
promoted to production. Only moving the versions
Incorrect C. Ensure that developers on the version control system (VCS) program will
do not have access to the backup prevent the transfer of development or earlier
server. versions.


D. Review the access control log of C. If unauthorized code was introduced onto the
the backup server. backup server by developers, controls on the
production server and the software version control
system should mitigate this risk.


D. Review of the access log will identify staff access
or the operations performed; however, it may not
provide enough information to detect the release of
unauthorized software.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LeCrae Harvard University
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2044
Lid sinds
3 jaar
Aantal volgers
1407
Documenten
21310
Laatst verkocht
1 dag geleden
Valuable Notes, Secure Learning

Welcome to ScholarVault—your ultimate destination for premium study materials and academic resources designed to unlock your full potential. As a passionate student myself, I understand how critical it is to have the right tools to excel in your studies. That's why I've curated a collection of high-quality notes, guides, and exam preparation materials that are tailored to help you achieve academic success. At ScholarVault, I believe that knowledge is power, but access to the right knowledge is key. My mission is to provide you with organized, comprehensive, and easy-to-understand study resources that make your learning journey smoother and more effective. Whether you're preparing for exams, reviewing class notes, or tackling tough concepts, you can count on me to deliver valuable, well-crafted content that aligns with your academic goals. Each resource has been carefully created with the intention to simplify complex topics, boost your confidence, and save you time. I aim to provide not just notes, but tools that truly make a difference in how you approach your studies. Explore the vault and discover everything you need to succeed—whether it’s detailed notes, in-depth study guides, or concise exam tips, everything is stored here for your academic growth. Thank you for trusting ScholarVault to be part of your learning experience. I’m excited to help you unlock your academic potential and achieve the success you deserve.

Lees meer Lees minder
4.0

433 beoordelingen

5
202
4
106
3
70
2
16
1
39

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen