Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 277

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 277

1. Transmitting redundant information with each character or frame to facilitate detection and correction of errors is called a:

A) feedback error control.
B) block sum check.
C) forward error control.
D) cyclic redundancy check.



2. The security level of a private key system depends on the number of:

A) encryption key bits.
B) messages sent.
C) keys.
D) channels used.



3. During what process should router access control lists be reviewed?

A) Environmental review
B) Network security review
C) Business continuity review
D) Data integrity review



4. Which of the following components is responsible for the collection of data in an intrusion detection system (IDS)?

A) Analyzer
B) Administration console
C) User interface
D) Sensor



5. Which of the following concerns associated with the World Wide Web would be addressed by a firewall?

A) Unauthorized access from outside the organization
B) Unauthorized access from within the organization
C) A delay in Internet connectivity
D) A delay in downloading using File Transfer Protocol (FTP)



1. Right Answer: C
Explanation: Forward error control involves transmitting additional redundant information with each character or frame to facilitate detection and correction of errors, in feedback error control, only enough additional information is transmitted so the receiver can identify that an error has occurred.Choices B and D are both error detection methods but not error correction methods. Block sum check is an extension of parity check wherein an additional set of parity bits is computed for a block of characters. A cyclic redundancy check is a technique wherein a single set of check digits is generated, based on the contents of the frame, for each frame transmitted.

2. Right Answer: A
Explanation: The security level of a private key system depends on the number of encryption key bits. The larger the number of bits, the more difficult it would be to understand or determine the algorithm. The security of the message will depend on the encryption key bits used. More than keys by themselves, the algorithm and its complexity make the content more secured. Channels, which could be open or secure, are the mode for sending the message.

3. Right Answer: B
Explanation: Network security reviews include reviewing router access control lists, port scanning, internal and external connections to the system, etc. Environmental reviews, business continuity reviews and data integrity reviews do not require a review of the router access control lists.

4. Right Answer: D
Explanation: Sensors are responsible for collecting data. Analyzers receive input from sensors and determine intrusive activity. An administration console and a user interface are components of an IDS.

5. Right Answer: A
Explanation: Firewalls are meant to prevent outsiders from gaining access to an organization's computer systems through the internet gateway. They form a barrier with the outside world, but are not intended to address access by internal users; they are more likely to cause delays than address such concerns.

0 Comments

Leave a comment