Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 330

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 330

1. TEMPEST is a hardware for which of the following purposes?

A) Eavedropping
B) Social engineering
C) Virus scanning
D) Firewalling
E) None of the choices.


2. Human error is being HEAVILY relied upon on by which of the following types of attack?

A) Eavedropping
B) DoS
C) DDoS
D) ATP
E) Social Engineering
F) None of the choices.

3. A computer system is no more secure than the human systems responsible for its operation. Malicious individuals have regularly penetrated well-designed, secure computer systems by taking advantage of the carelessness of trusted individuals, or by deliberately deceiving them. zombie computers are being HEAVILY relied upon on by which of the following types of attack?

A) Eavedropping
B) DoS
C) DDoS
D) ATP
E) Social Engineering
F) None of the choices.

4. Attack amplifier is often being HEAVILY relied upon on by which of the following types of attack?

A) Packet dropping
B) ToS
C) DDoS
D) ATP
E) Wiretapping
F) None of the choices.

5. Back Orifice is an example of:

A) a virus.
B) a legitimate remote control software.
C) a backdoor that takes the form of an installed program.
D) an eavesdropper.
E) None of the choices.


1. Right Answer: A
Explanation: Any data that is transmitted over a network is at some risk of being eavesdropped, or even modified by a malicious person. Even machines that operate as a closed system can be eavesdropped upon via monitoring the faint electromagnetic transmissions generated by the hardware such as TEMPEST.

2. Right Answer: E
Explanation:

3. Right Answer: C
Explanation: Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts ('zombie computers') are used to flood a target system with network requests, thus attempting to render it unusable through resource exhaustion.

4. Right Answer: C
Explanation: Distributed denial of service (DDoS) attacks are common, where a large number of compromised hosts are used to flood a target system with network requests.One technique to exhaust victim resources is through the use of an attack amplifier - where the attacker takes advantage of poorly designed protocols on 3rd party machines in order to instruct these hosts to launch the flood.

5. Right Answer: C
Explanation: A backdoor may take the form of an installed program (e.g., Back Orifice) or could be in the form of an existing 'legitimate' program, or executable file. A specific form of backdoors are rootkits, which replaces system binaries and/or hooks into the function calls of the operating system to hide the presence of other programs, users, services and open ports.

0 Comments

Leave a comment