Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 256

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 256

1. An installed Ethernet cable run in an unshielded twisted pair (UTP) network is more than 100 meters long. Which of the following could be caused by the length of the cable?

A) Electromagnetic interference (EMI)
B) Cross-talk
C) Dispersion
D) Attenuation



2. Which of the following would be considered an essential feature of a network management system?

A) A graphical interface to map the network topology
B) Capacity to interact with the Internet to solve the problems
C) Connectivity to a help desk for advice on difficult issues
D) An export facility for piping data to spreadsheets



3. The most likely error to occur when implementing a firewall is:

A) incorrectly configuring the access lists.
B) compromising the passwords due to social engineering.
C) connecting a modem to the computers in the network.
D) inadequately protecting the network and server from virus attacks.



4. When reviewing the implementation of a LAN, an IS auditor should FIRST review the:

A) node list.
B) acceptance test report.
C) network diagram.
D) user's list.



5. Which of the following would be the MOST secure firewall system?

A) Screened-host firewall
B) Screened-subnet firewall
C) Dual-homed firewall
D) Stateful-inspection firewall



1. Right Answer: D
Explanation: Attenuation is the weakening of signals during transmission. When the signal becomes weak, it begins to read a 1 for a 0, and the user may experience communication problems. UTP faces attenuation around 100 meters. Electromagnetic interference (EMl) is caused by outside electromagnetic waves affecting the desired signals, which is not the case here. Cross-talk has nothing to do with the length of the UTP cable.

2. Right Answer: A
Explanation: To trace the topology of the network, a graphical interface would be essential. It is not necessary that each network be on the internet and connected to a help desk, while the ability to export to a spreadsheet is not an essential element.

3. Right Answer: A
Explanation: An updated and flawless access list is a significant challenge and, therefore, has the greatest chance for errors at the time of the initial installation. Passwords do not apply to firewalls, a modem bypasses a firewall and a virus attack is not an element in implementing a firewall.

4. Right Answer: C
Explanation: To properly review a LAN implementation, an IS auditor should first verify the network diagram and confirm the approval. Verification of nodes from the node list and the network diagram would be next, followed by a review of the acceptance test report and then the user's list.

5. Right Answer: B
Explanation: A screened-subnet firewall, also used as a demilitarized zone (DMZ), utilizes two packet filtering routers and a bastion host. This provides the most secure firewall system, since it supports both network- and application-level security while defining a separate DMZ network. A screened-host firewall utilizes a packet filtering router and a bastion host. This approach implements basic network layer security (packet filtering) and application server security (proxy services). A dual- homed firewall system is a more restrictive form of a screened-host firewall system, configuring one interface for information servers and another for private network host computers. A stateful-inspection firewall working at the transport layer keeps track of the destination IP address of each packet that leaves the organization's internal network and allows a reply from the recorded IP addresses.

0 Comments

Leave a comment