Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 302

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 302

1. A perpetrator looking to gain access to and gather information about encrypted data being transmitted over the network would use:

A) eavesdropping
B) spoofing.
C) traffic analysis.
D) masquerading.



2. Upon receipt of the initial signed digital certificate the user will decrypt the certificate with the public key of the:

A) registration authority (RA).
B) certificate authority (CA).
C) certificate repository.
D) receiver.



3. IS management is considering a Voice-over Internet Protocol (VoIP) network to reduce telecommunication costs and management asked the IS auditor to comment on appropriate security controls. Which of the following security measures is MOST appropriate?

A) Review and, where necessary, upgrade firewall capabilities
B) Install modems to allow remote maintenance support access
C) Create a physically distinct network to handle VoIP traffic
D) Redirect all VoIP traffic to allow clear text logging of authentication credentials



4. Which of the following intrusion detection systems (IDSs) will MOST likely generate false alarms resulting from normal network activity?

A) Statistical-based
B) Signature-based
C) Neural network
D) Host-based



5. When auditing security for a data center, an IS auditor should look for the presence of a voltage regulator to ensure that the:

A) hardware is protected against power surges.
B) integrity is maintained if the main power is interrupted.
C) immediate power will be available if the main power is lost.
D) hardware is protected against long-term power fluctuations.



1. Right Answer: C
Explanation: In traffic analysis, which is a passive attack, an intruder determines the nature of the traffic flow between defined hosts and through an analysis of session length, frequency and message length, and the intruder is able to guess the type of communication taking place. This typically is used when messages are encrypted and eavesdropping would not yield any meaningful results, in eavesdropping, which also is a passive attack, the intruder gathers the information flowing through the network with the intent of acquiring and releasing message contents for personal analysis or for third parties. Spoofing and masquerading are active attacks, in spoofing, a user receives an e-mail that appears to have originated from one source when it actually was sent from another source. In masquerading, the intruder presents an identity other than the original identity.

2. Right Answer: B
Explanation: A certificate authority (CA) is a network authority that issues and manages security credentials and public keys for message encryption. As a part of the public key infrastructure, a CA checks with a registration authority (RA) to verify information provided by the requestor of a digital certificate. If the RA verifies the requestor's information, the CA can issue a certificate. The CA signs the certificate with its private key for distribution to the user. Upon receipt, the user will decrypt the certificate with the CA's public key.

3. Right Answer: A
Explanation: Firewalls used as entry points to a Voice-over Internet Protocol (VoIP) network should be VoIP- capable. VoIP network services such as H.323 introduce complexities that are likely to strain the capabilities of older firewalls. Allowing for remote support access is an important consideration. However, a virtual private network (VPN) would offer a more secure means of enabling this access than reliance on modems. Logically separating the VoIP and data network is a good idea.Options such as virtual LANS (VLA.NS), traffic shaping, firewalls and network address translation (NAT) combined with private IP addressing can be used; however, physically separating the networks will increase both cost and administrative complexity. Transmitting or storing clear text information, particularly sensitive information such as authentication credentials, will increase network vulnerability. When designing a VoIP network, it is important to avoid introducing any processing that will unnecessarily increase latency since this will adversely impact VoIP quality.

4. Right Answer: A
Explanation: A statistical-based IDS relies on a definition of known and expected behavior of systems. Since normal network activity may at times include unexpected behavior(e.g., a sudden massive download by multiple users), these activities will be flagged as suspicious. A signature-based IDS is limited to its predefined set of detection rules, just like a virus scanner. A neural network combines the previous two IDSs to create a hybrid and better system. Host-based is another classification of IDS. Any of the three IDSs above may be host- or network-based.

5. Right Answer: A
Explanation: A voltage regulator protects against short-term power fluctuations. It normally does not protect against long-term surges, nor does it maintain the integrity if power is interrupted or lost.

0 Comments

Leave a comment