Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 295

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 295

1. When installing an intrusion detection system (IDS), which of the following is MOST important?

A) Properly locating it in the network architecture
B) Preventing denial-of-service (DoS) attacks
C) Identifying messages that need to be quarantined
D) Minimizing the rejection errors



2. In a public key infrastructure (PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?

A) Nonrepudiation
B) Encryption
C) Authentication
D) Integrity



3. Which of the following ensures confidentiality of information sent over the internet?

A) Digital signature
B) Digital certificate
C) Online Certificate Status Protocol
D) Private key cryptosystem



4. To protect a VoIP infrastructure against a denial-of-service (DoS) attack, it is MOST important to secure the:

A) access control servers.
B) session border controllers.
C) backbone gateways.
D) intrusion detection system (IDS).



5. Which of the following attacks targets the Secure Sockets Layer (SSL)?

A) Man-in-the middle
B) Dictionary
C) Password sniffing
D) Phishing



1. Right Answer: A
Explanation: Proper location of an intrusion detection system (IDS) in the network is the most important decision during installation. A poorly located IDS could leave key areas of the network unprotected. Choices B, C and D are concerns during the configuration of an IDS, but if the IDS is not placed correctly, none of them would be adequately addressed.

2. Right Answer: A
Explanation: Nonrepudiation, achieved through the use of digital signatures, prevents the claimed sender from later denying that they generated and sent the message.Encryption may protect the data transmitted over the Internet, but may not prove that the transactions were made. Authentication is necessary to establish the identification of all parties to a communication. Integrity ensures that transactions are accurate but does not provide the identification of the customer.

3. Right Answer: D
Explanation: Confidentiality is assured by a private key cryptosystem. Digital signatures assure data integrity, authentication and nonrepudiation, but not confidentially. A digital certificate is a certificate that uses a digital signature to bind together a public key with an identity; therefore, it does not address confidentiality. Online CertificateStatus Protocol (OCSP) is an Internet protocol used for obtaining the revocation status of a digital certificate.

4. Right Answer: B
Explanation: Session border controllers enhance the security in the access network and in the core. In the access network, they hide a user's real address and provide a managed public address. This public address can be monitored, minimizing the opportunities for scanning and denial-of-service (DoS) attacks. Session border controllers permit access to clients behind firewalls while maintaining the firewall's effectiveness. In the core, session border controllers protect the users and the network. They hide network topology and users' real addresses. They can also monitor bandwidth and quality of service. Securing the access control server, backbone gateways and intrusion detection systems (IDSs) does not effectively protect against DoS attacks.

5. Right Answer: A
Explanation: Attackers can establish a fake Secure Sockets Layer (SSL) server to accept user's SSL traffic and then route to the real SSL server, so that sensitive information can be discovered. A dictionary attack that has been launched to discover passwords would not attack SSL since SSL does not rely on passwords. SSL traffic is encrypted; thus it is not possible to sniff the password. A phishing attack targets a user and not SSL Phishing attacks attempt to have the user surrender private information by falsely claiming to be a trusted person or enterprise.

0 Comments

Leave a comment