Topics
Products
Follow Us:
Hemangdoshi
Answered: May 25, 2020
C. Hardening the server configuration

Hardening a system means to configure it in the most secure manner (install latest security patches, properly define the access authorization for...Read More

1 Answer

246 views
Hemangdoshi
Answered: May 25, 2020
C. close firewall-2.

Traffic for the internal network that did not originate from the mail gateway is a sign that firewall-1 is not functioning properly. This may have been be caused by...Read More

1 Answer

245 views
Hemangdoshi
Answered: May 25, 2020
A. inherent risk assessment.

The first step in a risk-based audit approach is to gather information about the business and industry to evaluate the inherent risks. After completing the...Read More

1 Answer

245 views
Hemangdoshi
Answered: May 25, 2020
D. Compensating controls

Compensating controls are internal controls that are intended to reduce the risk of an existing or potential control weakness that may arise when duties cannot be...Read More

1 Answer

244 views
Hemangdoshi
Answered: May 25, 2020
C. Fiber-optic cables

Fiber-optic cables have proven to be more secure than the other media. Satellite transmission and copper wire can be violated with inexpensive equipment. Coaxial...Read More

1 Answer

244 views
Hemangdoshi
Answered: May 25, 2020
B. Detection

Detection risks are directly affected by the auditors selection of audit procedures and techniques. Inherent risks usually are not affected by the IS auditor. Control risks...Read More

1 Answer

243 views
Hemangdoshi
Answered: May 25, 2020
B. A hash of the data that is transmitted and encrypted with the customer s private key

The calculation of a hash or digest of the data that are transmitted and its encryption require the...Read More

1 Answer

243 views
Hemangdoshi
Answered: May 25, 2020
B. Bus

The bus topology is vulnerable to failure if one device fails. In line and bus networks, which are essentially the same thing, terminals are connected to a single cable. If this...Read More

3 Answers

242 views
Hemangdoshi
Answered: May 25, 2020
D. Appropriate utilisation of resources for high risk areas.

The risk-based approach is designed to ensure audit time is spent on the areas of highest risk. The development of an audit...Read More

1 Answer

242 views
Hemangdoshi
Answered: May 25, 2020
B. diverse routing.

Diverse routing is the method of routing traffic through split-cable facilities or duplicate-cable facilities, which can be accomplished with different/duplicate cable...Read More

1 Answer

242 views
Hemangdoshi
Answered: May 25, 2020
B. A compliance test of program library controls

A compliance test determines if controls are operating as designed and are being applied in a manner that complies with management policies...Read More

1 Answer

241 views
Hemangdoshi
Answered: May 25, 2020
C. Encapsulation

Encapsulation is a property of objects, and it prevents accessing either properties or methods that have not been previously defined as public. This means that any...Read More

1 Answer

241 views
Hemangdoshi
Answered: May 25, 2020
C. test environment using live workloads.

Stress testing is carried out to ensure a system can cope with production workloads. A test environment should always be used to avoid damaging...Read More

1 Answer

241 views
Hemangdoshi
Answered: May 25, 2020
A. Black box test

A black box test is a dynamic analysis tool for testing software modules. During the testing of software modules a black box test works first in a cohesive manner as a...Read More

1 Answer

240 views

Related Topics Of CISA

Loading, please wait...

Email Sent
We have sent an email to your address "" with instructions to reset your password.