Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 254

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 254

1. The MAIN criterion for determining the severity level of a service disruption incident is:

A) cost of recovery.
B) negative public opinion.
C) geographic location.
D) downtime.



2. Which of the following would be an indicator of the effectiveness of a computer security incident response team?

A) Financial impact per security incident
B) Number of security vulnerabilities that were patched
C) Percentage of business applications that are being protected
D) Number of successful penetration tests



3. An IS auditor evaluating the resilience of a high-availability network should be MOST concerned if:

A) the setup is geographically dispersed.
B) the network servers are clustered in a site.
C) a hot site is ready for activation.
D) diverse routing is implemented for the network.



4. Which of the following network components is PRIMARILY set up to serve as a security measure by preventing unauthorized traffic between different segments of the network?

A) Firewalls
B) Routers
C) Layer 2 switches
D) VLANs



5. A company is implementing a dynamic host configuration protocol (DHCP). Given that the following conditions exist, which represents the GREATEST concern?

A) Most employees use laptops.
B) A packet filtering firewall is used.
C) The IP address space is smaller than the number of PCs.
D) Access to a network port is not restricted.



1. Right Answer: D
Explanation: The longer the period of time a client cannot be serviced, the greater the severity of the incident. The cost of recovery could be minimal yet the service downtime could have a major impact.Negative public opinion is a symptom of an incident. Geographic location does not determine the severity of the incident.

2. Right Answer: A
Explanation: The most important indicator is the financial impact per security incident. Choices B, C and D could be measures of effectiveness of security, but would not be a measure of the effectiveness of a response team.

3. Right Answer: B
Explanation: A clustered setup in one location makes the entire network vulnerable to natural disasters or other disruptive events. Dispersed geographical locations and diverse routing provide backup if a site has been destroyed. A hot site would also be a good alternative for a single point-of-failure site.

4. Right Answer: A
Explanation: Firewall systems are the primary tool that enable an organization to prevent unauthorized access between networks. An organization may choose to deploy one or more systems that function as firewalls. Routers can filter packets based on parameters, such as source address, but are not primarily a security tool. Based onMedia Access Control (MAC) addresses, layer 2 switches separate traffic in a port as different segments and without determining if it is authorized or unauthorized traffic. A virtual LAN (VLAN) is a functionality of some switches that allows them to switch the traffic between different ports as if they are in the same LAN.Nevertheless, they do not deal with authorized vs. unauthorized traffic.

5. Right Answer: D
Explanation: Given physical access to a port, anyone can connect to the internal network. The other choices do not present the exposure that access to a port does. DHCP provides convenience (an advantage) to the laptop users. Sharing IP addresses and the existence of a firewall can be security measures.

0 Comments

Leave a comment