Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 248

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 248

1. Which of the following is widely accepted as one of the critical components in networking management?

A) Configuration management
B) Topological mappings
C) Application of monitoring tools
D) Proxy server troubleshooting



2. Which of the following controls will MOST effectively detect the presence of bursts of errors in network transmissions?

A) Parity check
B) Echo check
C) Block sum check
D) Cyclic redundancy check



3. Which of the following types of firewalls provide the GREATEST degree and granularity of control?

A) Screaming router
B) Packet filter
C) Application gateway
D) Circuit gateway



4. Which of the following is MOST directly affected by network performance monitoring tools?

A) Integrity
B) Availability
C) Completeness
D) Confidentiality



5. A review of wide area network (WAN) usage discovers that traffic on one communication line between sites, synchronously linking the master and standby database, peaks at 96 percent of the line capacity. An IS auditor should conclude that:

A) analysis is required to determine if a pattern emerges that results in a service loss for a short period of time.
B) WAN capacity is adequate for the maximum traffic demands since saturation has not been reached.
C) the line should immediately be replaced by one with a larger capacity to provide approximately 85 percent saturation.
D) users should be instructed to reduce their traffic demands or distribute them across all service hours to flatten bandwidth consumption.



1. Right Answer: A
Explanation: Configuration management is widely accepted as one of the key components of any network, since it establishes how the network will function internally and externally, it also deals with the management of configuration and monitoring performance. Topological mappings provide outlines of the components of the network and its connectivity. Application monitoring is not essential and proxy server troubleshooting is used for troubleshooting purposes.

2. Right Answer: D
Explanation: The cyclic redundancy check (CRC) can check for a block of transmitted data. The workstations generate the CRC and transmit it with the data. The receiving workstation computes a CRC and compares it to the transmitted CRC. if both of them are equal. Then the block is assumed error free, in this case (such as in parity error or echo check), multiple errors can be detected. In general, CRC can detect all single-bit and bubble-bit errors. Parity check (known as vertical redundancy check) also involves adding a bit (known as the parity bit) to each character during transmission. In this case, where there is a presence of bursts of errors (i.e., impulsing noise during high transmission rates), it has a reliability of approximately 50 percent. Inhigher transmission rates, this limitation is significant.Echo checks detect line errors by retransmitting data to the sending device for comparison with the original transmission.

3. Right Answer: C
Explanation: The application gateway is similar to a circuit gateway, but it has specific proxies for each service. To handle web services, it has an HTTP proxy that acts as an intermediary between externals and internals, but is specifically for HTTP. This means that it not only checks the packet IP addresses (layer 3) and the ports it is directed to (in this case port 80, or layer 4), it also checks every HTTP command (layers 5 and 7). Therefore, it works in a more detailed (granularity) way than the others. Screening router and packet filter (choices A and BJ work at the protocol, service and/or port level. This means that they analyze packets from layers 3 and 4, and not from higher levels. A circuit gateway (choice D) is based on a proxy or program that acts as an intermediary between external and internal accesses. This means that during an external access, instead of opening a single connection to the internal server, two connections are established-one from the external server to the proxy (which conforms the circuit-gateway) and one from the proxy to the internal server. Layers 3 and 4 (IP and TCP) and some general features from higher protocols are used to perform these tasks.

4. Right Answer: B
Explanation: In case of a disruption in service, one of the key functions of network performance monitoring tools is to ensure that the information has remained unaltered. It is a function of security monitoring to assure confidentiality by using such tools as encryption. However, the most important aspect of network performance is assuring the ongoing dependence on connectivity to run the business. Therefore, the characteristic that benefits the most from network monitoring is availability.

5. Right Answer: A
Explanation: The peak at 96 percent could be the result of a one-off incident, e.g., a user downloading a large amount of data; therefore, analysis to establish whether this is a regular pattern and what causes this behavior should be carried out before expenditure on a larger line capacity is recommended. Since the link provides for a standby database, a short loss of this service should be acceptable. If the peak is established to be a regular occurrence without any other opportunities for mitigation (usage of bandwidth reservation protocol, or other types of prioritizing network traffic), the line should be replaced as there is the risk of loss of service as the traffic approaches 100 percent. If, however, the peak is a one-off or can be put in other time frames, then user education may be an option.

0 Comments

Leave a comment