Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 243

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 243

1. IT operations for a large organization have been outsourced. An IS auditor reviewing the outsourced operation should be MOST concerned about which of the following findings?

A) The outsourcing contract does not cover disaster recovery for the outsourced IT operations.
B) The service provider does not have incident handling procedures.
C) Recently a corrupted database could not be recovered because of library management problems.
D) incident logs are not being reviewed.



2. Which of the following BEST ensures the integrity of a server's operating system?

A) Protecting the server in a secure location
B) Setting a boot password
C) Hardening the server configuration
D) Implementing activity logging



3. The MOST significant security concerns when using flash memory (e.g., USB removable disk) is that the:

A) contents are highly volatile.
B) data cannot be backed up.
C) data can be copied.
D) device may not be compatible with other peripherals.



4. The database administrator (DBA) suggests that DB efficiency can be improved by denormalizing some tables. This would result in:

A) loss of confidentiality.
B) increased redundancy.
C) unauthorized accesses.
D) application malfunctions.



5. Web and e-mail filtering tools are PRIMARILY valuable to an organization because they:

A) protect the organization from viruses and nonbusiness materials.
B) maximize employee performance.
C) safeguard the organization's image.
D) assist the organization in preventing legal issues



1. Right Answer: A
Explanation: The lack of a disaster recovery provision presents a major business risk. Incorporating such a provision into the contract will provide the outsourcing organization leverage over the service provider. Choices B, C and D are problems that should be addressed by the service provider, but are not as important as contract requirements for disaster recovery.

2. Right Answer: C
Explanation: Hardening a system means to configure it in the most secure manner (install latest security patches, properly define the access authorization for users and administrators, disable insecure options and uninstall unused services) to prevent nonprivileged users from gaining the right to execute privileged instructions and thus take control of the entire machine, jeopardizing the OS's integrity. Protecting the server in a secure location and setting a boot password are good practices, but do not ensure that a user will not try to exploit logical vulnerabilities and compromise the OS. Activity logging has two weaknesses in this scenario-it is a detective control (not a preventive one), and the attacker who already gained privileged access can modify logs or disable them.

3. Right Answer: C
Explanation: Unless properly controlled, flash memory provides an avenue for anyone to copy any content with ease. The contents stored in flash memory are not volatile. Backing up flash memory data is not a control concern, as the data are sometimes stored as a backup. Flash memory will be accessed through a PC rather than any other peripheral; therefore, compatibility is not an issue.

4. Right Answer: B
Explanation: Normalization is a design or optimization process for a relational database (DB) that minimizes redundancy; therefore, denormalization would increase redundancy. Redundancy which is usually considered positive when it is a question of resource availability is negative in a database environment, since it demands additional and otherwise unnecessary data handling efforts.Denormalization is sometimes advisable for functional reasons. It should not cause loss of confidentiality, unauthorized accesses or application malfunctions.

5. Right Answer: A
Explanation: The main reason for investing in web and e-mail filtering tools is that they significantly reduce risks related to viruses, spam, mail chains, recreational surfing and recreational e- mail. Choice B could be true in some circumstances (i.e., it would need to be implemented along with an awareness program, so that employee performance can be significantly improved). However, in such cases, it would not be as relevant as choice A. Choices C and D are secondary or indirect benefits.

0 Comments

Leave a comment