Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 289

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 289

1. Confidentiality of the data transmitted in a wireless LAN is BEST protected if the session is:

A) restricted to predefined MAC addresses.
B) encrypted using static keys.
C) encrypted using dynamic keys.
D) initiated from devices that have encrypted storage.



2. Which of the following provides the MOST relevant information for proactively strengthening security settings?

A) Bastion host
B) Intrusion detection system
C) Honeypot
D) Intrusion prevention system



3. Over the long term, which of the following has the greatest potential to improve the security incident response process?

A) A walkthrough review of incident response procedures
B) Postevent reviews by the incident response team
C) Ongoing security training for users
D) Documenting responses to an incident



4. When reviewing an intrusion detection system (IDS), an IS auditor should be MOST concerned about which of the following?

A) Number of nonthreatening events identified as threatening
B) Attacks not being identified by the system
C) Reports/logs being produced by an automated tool
D) Legitimate traffic being blocked by the system



5. Distributed denial-of-service (DDOS) attacks on Internet sites are typically evoked by hackers using which of the following?

A) Logic bombs
B) Phishing
C) Spyware
D) Trojan horses



1. Right Answer: C
Explanation: When using dynamic keys, the encryption key is changed frequently, thus reducing the risk of the key being compromised and the message being decrypted.Limiting the number of devices that can access the network does not address the issue of encrypting the session. Encryption with static keys-using the same key for a long period of time-risks that the key would be compromised. Encryption of the data on the connected device (laptop, PDA, etc.) addresses the confidentiality of the data on the device, not the wireless session.

2. Right Answer: C
Explanation: The design of a honeypot is such that it lures the hacker and provides clues as to the hacker's methods and strategies and the resources required to address such attacks. A bastion host does not provide information about an attack. Intrusion detection systems and intrusion prevention systems are designed to detect and address an attack in progress and stop it as soon as possible. A honeypot allows the attack to continue, so as to obtain information about the hacker's strategy and methods.

3. Right Answer: B
Explanation: Postevent reviews to find the gaps and shortcomings in the actual incident response processes will help to improve the process over time. Choices A, C and D are desirable actions, but postevent reviews are the most reliable mechanism for improving security incident response processes.

4. Right Answer: B
Explanation: Attacks not being identified by the system present a higher risk, because they are unknown and no action will be taken to address the attack. Although the number of false-positives is a serious issue, the problem will be known and can be corrected. Often, IDS reports are first analyzed by an automated tool to eliminate known false-positives, which generally are not a problem. An IDS does not block any traffic.

5. Right Answer: D
Explanation: Trojan horses are malicious or damaging code hidden within an authorized computer program. Hackers use Trojans to mastermind DDOS attacks that affect computers that access the same Internet site at the same moment, resulting in overloaded site servers that may no longer be able to process legitimate requests.Logic bombs are programs designed to destroy or modify data at a specific time in the future. Phishing is an attack, normally via e-mail, pretending to be an authorized person or organization requesting information. Spyware is a program that picks up information from PC drives by making copies of their contents.

0 Comments

Leave a comment