100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA Exam – Questions Answered With Expert Insights

Rating
-
Sold
-
Pages
174
Grade
A+
Uploaded on
07-01-2026
Written in
2025/2026

CISA Exam – Questions Answered With Expert Insights

Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA - Certified Information Systems Auditor
Course
CISA - Certified Information Systems Auditor

Document information

Uploaded on
January 7, 2026
Number of pages
174
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISA Exam – Questions Answered With Expert
Insights

Save




Terms in this set (208)



In a public key infrastructure (PKI), You are correct, the answer is A.
which of the following may be relied
upon to prove that an online
transaction was authorized by a A. Nonrepudiation, achieved through the use of
specific customer? digital signatures, prevents the senders from later
denying that they generated and sent the message.
Correct A. Nonrepudiation
B. Encryption may protect the data transmitted over
B. Encryption the Internet, but may not prove that the transactions
were made.
C. Authentication
C. Authentication is necessary to establish the
D. Integrity identification of all parties to a communication.


. D. Integrity ensures that transactions are accurate but
does not provide the identification of the customer

,Which of the following BEST ensures You are correct, the answer is C.
the integrity of a server's operating
system (OS)?
A. Protecting the server in a secure location is a
A. Protecting the server in a secure good practice, but does not ensure that a user will
location not try to exploit logical vulnerabilities and
compromise the operating system (OS).
B. Setting a boot password
B. Setting a boot password is a good practice, but
Correct C. Hardening the server does not ensure that a user will not try to exploit
configuration logical vulnerabilities and compromise the OS.


D. Implementing activity logging C. Hardening a system means to configure it in the
most secure manner (install latest security patches,
properly define access authorization for users and
administrators, disable insecure options and uninstall
unused services) to prevent nonprivileged users from
gaining the right to execute privileged instructions
and, thus, take control of the entire machine,
jeopardizing the integrity of the OS.


D. Activity logging has two weaknesses in this
scenario—it is a detective control (not a preventive
one), and the attacker who already gained privileged
access can modify logs or disable them.

,The IS auditor is reviewing an You answered B. The correct answer is D.
organization's human resources (HR)
database implementation. The IS
auditor discovers that the database A. Digital signatures are used for authentication and
servers are clustered for high nonrepudiation, and are not commonly used in
availability, all default database databases. As a result, this is not an area in which the
accounts have been removed and IS auditor should investigate.
database audit logs are kept and
reviewed on a weekly basis. What B. A nonce is defined as a "parameter that changes
other area should the IS auditor check over time" and is similar to a number generated to
to ensure that the databases are authenticate one specific user session. Nonces are
appropriately secured? not related to database security (they are commonly
used in encryption schemes).
A. Database digital signatures
C. A media access control (MAC) address is the
Incorrect B. Database encryption hardware address of a network interface. MAC
nonces and other variables address authentication is sometimes used with
wireless local area network (WLAN) technology, but
C. Database media access control is not related to database security.
(MAC) address authentication
D. When a database is opened, many of its
D. Database initialization parameters configuration options are governed by initialization
parameters. These parameters are usually governed
by a file ("init.ora" in the case of Oracle DBMS), which
contains many settings. The system initialization
parameters address many "global" database settings,
including authentication, remote access and other
critical security areas. To effectively audit a database
implementation, the IS auditor must examine the
database initialization parameters.

, Which of the following processes will You answered C. The correct answer is B.
be MOST effective in reducing the risk
that unauthorized software on a
backup server is distributed to the A. Even if replication is be conducted manually with
production server? due care, there still remains a risk to copying
unauthorized software from one server to another.
A. Manually copy files to accomplish
replication. B. It is common practice for software changes to be
tracked and controlled using version control
B. Review changes in the software software. An IS auditor should review reports or logs
version control system. from this system to identify the software that is
promoted to production. Only moving the versions
Incorrect C. Ensure that developers on the version control system (VCS) program will
do not have access to the backup prevent the transfer of development or earlier
server. versions.


D. Review the access control log of C. If unauthorized code was introduced onto the
the backup server. backup server by developers, controls on the
production server and the software version control
system should mitigate this risk.


D. Review of the access log will identify staff access
or the operations performed; however, it may not
provide enough information to detect the release of
unauthorized software.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LeCrae Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2044
Member since
3 year
Number of followers
1407
Documents
21294
Last sold
1 day ago
Valuable Notes, Secure Learning

Welcome to ScholarVault—your ultimate destination for premium study materials and academic resources designed to unlock your full potential. As a passionate student myself, I understand how critical it is to have the right tools to excel in your studies. That's why I've curated a collection of high-quality notes, guides, and exam preparation materials that are tailored to help you achieve academic success. At ScholarVault, I believe that knowledge is power, but access to the right knowledge is key. My mission is to provide you with organized, comprehensive, and easy-to-understand study resources that make your learning journey smoother and more effective. Whether you're preparing for exams, reviewing class notes, or tackling tough concepts, you can count on me to deliver valuable, well-crafted content that aligns with your academic goals. Each resource has been carefully created with the intention to simplify complex topics, boost your confidence, and save you time. I aim to provide not just notes, but tools that truly make a difference in how you approach your studies. Explore the vault and discover everything you need to succeed—whether it’s detailed notes, in-depth study guides, or concise exam tips, everything is stored here for your academic growth. Thank you for trusting ScholarVault to be part of your learning experience. I’m excited to help you unlock your academic potential and achieve the success you deserve.

Read more Read less
4.0

433 reviews

5
202
4
106
3
70
2
16
1
39

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions