Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 259

Mary Smith

Fri, 17 Apr 2026

CISA—Certified Information Systems Auditor - Part 259

1. When auditing a proxy-based firewall, an IS auditor should:

A) verify that the firewall is not dropping any forwarded packets.
B) review Address Resolution Protocol (ARP) tables for appropriate mapping between media access control (MAC) and IP addresses.
C) verify that the filters applied to services such as HTTP are effective.
D) test whether routing information is forwarded by the firewall.



2. An IS auditor should review the configuration of which of the following protocols to detect unauthorized mappings between the IP address and the media access control (MAC) address?

A) Simple Object Access Protocol (SOAP)
B) Address Resolution Protocol (ARP)
C) Routing Information Protocol (RIP)
D) Transmission Control Protocol (TCP)



3. An IS auditor examining the configuration of an operating system to verify the controls should review the:

A) transaction logs.
B) authorization tables.
C) parameter settings.
D) routing tables.



4. When reviewing an implementation of a VoIP system over a corporate WAN, an IS auditor should expect to find:

A) an integrated services digital network (ISDN) data link.
B) traffic engineering.
C) wired equivalent privacy (WEP) encryption of data.
D) analog phone terminals.



5. Which of the following is a feature of Wi-Fi Protected Access (WPA) in wireless networks?

A) Session keys are dynamic
B) Private symmetric keys are used
C) Keys are static and shared
D) Source addresses are not encrypted or authenticated



1. Right Answer: C
Explanation: A proxy-based firewall works as an intermediary (proxy) between the service or application and the client, it makes a connection with the client and opens a different connection with the server and, based on specific filters and rules, analyzes all the traffic between the two connections.Unlike a packet-filtering gateway, a proxy-based firewall does not forward any packets. Mapping between media access control (MAC) and IP addresses is a task for protocols such as Address Resolution Protocol/Reverse Address Resolution Protocol (ARP/RARP).

2. Right Answer: B
Explanation: Address Resolution Protocol (ARP) provides dynamic address mapping between an IP address and hardware address. Simple Object Access Protocol (SOAP) is a platform- independent XML- based protocol, enabling applications to communicate with each other over the Internet, and does not deal with media access control (MAC) addresses. Routing Information Protocol (RIP) specifies how routers exchange routing table information. Transmission Control Protocol (TCP) enables two hosts to establish a connection and exchange streams of data.

3. Right Answer: C
Explanation: Parameters allow a standard piece of software to be customized for diverse environments and are important in determining how a system runs. The parameter settings should be appropriate to an organization's workload and control environment, improper implementation and/or monitoring of operating systems can result in undetected errors and corruption of the data being processed, as well as lead to unauthorized access and inaccurate logging of system usage. Transaction logs are used to analyze transactions in master and/or transaction files. Authorization tables are used to verify implementation of logical access controls and will not be of much help when reviewing control features of an operating system. Routing tables do not contain information about the operating system and, therefore, provide no information to aid in the evaluation of controls.

4. Right Answer: B
Explanation: To ensure that quality of service requirements are achieved, the Voice-over IP (VoIP) service over the wide area network (WAN) should be protected from packet losses, latency or jitter. To reach this objective, the network performance can be managed using statistical techniques such as traffic engineering. The standard bandwidth of an integrated services digital network (ISDN) data link would not provide the quality of services required for corporate VoIP services. WEP is an encryption scheme related to wireless networking. The VoIP phones are usually connected to a corporate local area network (LAN) and are not analog.

5. Right Answer: A
Explanation: WPA uses dynamic session keys, achieving stronger encryption than wireless encryption privacy (WEP), which operates with static keys (same key is used for everyone in the wireless network). All other choices are weaknesses of WEP.

0 Comments

Leave a comment