ImageVerifierCode 换一换
格式:DOCX , 页数:8 ,大小:17.11KB ,
资源ID:1402578      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bingdoc.com/d-1402578.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(CISA冲刺考试六Word格式.docx)为本站会员(b****2)主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(发送邮件至service@bingdoc.com或直接QQ联系客服),我们立即给予删除!

CISA冲刺考试六Word格式.docx

1、004.Java applets and ActiveX controls are distributed executable programs that execute in the background of a web browser client. This practice is considered reasonable when the source of the executable file is certain.005.In large corporate networks having supply partners across the globe network t

2、raffic may continue to rise. The infrastructure components in such environments should be scalable. The appliance firewall architecture limits future scalability.006.Transmission media,fiberoptic cable,provide the best security against unauthorized access.007.Review the parameter settings is the bes

3、t audit procedure to determine if a firewall is configured in compliance with an organizations security policy.008.To determine how data are accessed across different platforms in a heterogeneous environment, an IS auditor should first review application services.009.An organization has outsourced i

4、ts help desk. The best indicator to include in the service level agreement(SLA): percentage of incidents solved in the first call.010.A review of wide area network(WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks

5、at 96 percent of the line capacity. An IS auditor should conclude that analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.011.During the requirements definition phase for a database application, performance is listed as a top priority. To

6、 access the DBMS files, storage area network(SAN) should be recommended for optimal I/O performance.012.The best way to minimize the risk of communication failures in an e-commerce environment would be to use leased asynchronous transfer mode lines.013.An IS auditor reviewing an organizations data f

7、ile control procedures finds that transactions are applied to the most current files, while restart procedures use earlier versions. The IS auditor should recommend the implementation of versions usage control.014.The purpose of code signing is to provide assurance that the software has not been sub

8、sequently modified.015.An IS auditor analyzing the audit log of a database management system(DBMS) finds that some transactions were partially executed as a result of an error, and are not rolled back. In this case, atomicity has been violated.016.Reverse proxy technology for web servers should be d

9、eployed if http servers address must be hidden.017.Clustering technique best limits the impact of server failures in a distributed environment.018.When reviewing a hardware maintenance program, an IS auditor should assess whether the parogram is validated against vendor specifications.019.An IS audi

10、tor should recommend the use of library control software to provide reasonable assurance that program changes have been authorized.020.When auditing a proxy-based firewall, an IS auditor should verify that the filters applied to services such as HTTP are effective.021.Address Resolution Protocol(ARP

11、) provides dynamic address mapping between an IP address and hardware address.022.The primary objective of service-level management(SLM) is to define,agree,record and manage the required levels of service.023.From an IS auditors perspective, the primary objective of auditing the management of servic

12、e providers should be to determine if the services that were requested were provided in a way that is acceptable,seamless and in line with contractual agreements.024.IT best practices for the availability and continuity of IT services should provide reasonable assurance that agreed upon obligations

13、to customers can be met.025.An organization has recently installed a security patch, which crashed the production server. To minimize the probability of this occurring again, an IS auditor should ensure that a good change management process is in place.026.During maintenance of a relational database

14、, several values of the foreign key in a transaction table of a relational database have been corrupted. The consequence is that the detail of involved transactions may no longer be associated with master data, causing errors when these transactions are processed.027.In a relational database with re

15、ferential integrity, the use of foreign key would prevent deletion of a row from a customer table as long as the customer number of that row is stored with live orders on the orders table.028.A postincident review examines both the cause and response to an incident. The lessons learned from the revi

16、ew can be used to improve internal controls. Understanding the purpose and structure of postincident reviews and follow-up procedures enables the information security manager to continuously improve the security program.029.An IS auditor examing the configuration of an operating system to verify the

17、 controls should review the parameter settings.030.The computer security incident response team(CSIRT) of an organization disseminates detailed descriptions of recent threats. An IS auditors greatest concern should be that the users might use this information to launch attacks.031.In order to ensure

18、 an adequate segregation of duties between IS and end users, the application owner should be responsible for authorizing access to data.032.Accountability for the maintenance of appropriate security measures over information assets resides with the data and system owners.033.The greatest risk when e

19、nd users have access to a database at its system level, instead of through the application, is that the users can make unauthorized changes to the database directly, without an audit trail.034.To determine who has been given permission to use a particular system resource, an IS auditor should review

20、 access control lists.035.When granting temporary access to vendors, the most effective control:User accounts are created with expiration dates and are based on services provided.036.During a logical access controls review, an IS auditor observes that user accounts are shared. The greatest risk resu

21、lting from this situation is that user accountablility may not be established.037.A two-factor user authentication: A smart card requring the users PIN.038.Access control software is the most effective method of preventing unauthorized use of data files.039.Logical access control is the primary safe

22、guard for securing software and data within an information processing facility.040.Provides an audit trail is a benefit of using a callback device.041.When reviewing an organizaions logical access security,an IS auditor should be most concerned : Password files are not encrypted.042.Passwords should

23、 be assigned by the security administrator for first time logon.043.Deletion of transaction data files should be a function of the application support team, not operations staff.044.The most appropriate control to prevent unauthorized entry is to terminate connction after a specified number of attem

24、pts.045.An IS auditor conducting an access control review in a client-server environment discovers that all printiing options are accessible by all users. In this situation, the IS auditor is most likely to conclude that exposure is greater, since information is available to unauthorized users.046.S

25、ign-on procedures include the creation of a unique user ID and password. However, an IS auditor discovers that, in many cases, the username and password are the same. The best control to mitigate this risk is to build in validations to prevent this during user creation and password change.047.The pr

26、imary objective of a logical control review is to ensure that access is granted per the organizaions authorities.048.Naming conventions for system resoureces are important for access control because thery reduce the number of rules required to adequately protect resources.049.Line grabbing will enable eavesdropping, thus allowing unauthorized data access.

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2