Download ISACA.CISA.Dump4Pass.2020-11-02.3108q.vcex

Download Exam

File Info

Exam Certified Information Systems Auditor
Number CISA
File Name ISACA.CISA.Dump4Pass.2020-11-02.3108q.vcex
Size 2 MB
Posted Nov 02, 2020
Downloads: 1
Download ISACA.CISA.Dump4Pass.2020-11-02.3108q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

A shared resource matrix is a technique commonly used to locate:


  1. Malicious code
  2. Security flaws
  3. Trap doors
  4. Covert channels
Correct answer: D



Question 2

You are part of a security staff at a highly profitable bank and each day, all traffic on the network is logged for later review. Every Friday when major deposits are made you're seeing a series of bits placed in the "Urgent Pointer" field of a TCP packet. This is only 16 bits which isn't much but it concerns you because:


  1. This could be a sign of covert channeling in bank network communications and should be investigated.
  2. It could be a sign of a damaged network cable causing the issue.
  3. It could be a symptom of malfunctioning network card or drivers and the source system should be checked for the problem.
  4. It is normal traffic because sometimes the previous fields 16-bit checksum value can over run into the urgent pointer's 16-bit field causing the condition.
Correct answer: A



Question 3

John is the product manager for an information system. His product has undergone under security review by an IS auditor. John has decided to apply appropriate security controls to reduce the security risks suggested by an IS auditor. Which of the following technique is used by John to treat the identified risk provided by an IS auditor?


  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: A



Question 4

Sam is the security Manager of a financial institute. Senior management has requested he performs a risk analysis on all critical vulnerabilities reported by an IS auditor. After completing the risk analysis, Sam has observed that for a few of the risks, the cost benefit analysis shows that risk mitigation cost (countermeasures, controls, or safeguard) is more than the potential lost that could be incurred. What kind of a strategy should Sam recommend to the senior management to treat these risks?


  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: B



Question 5

Which of the following risk handling technique involves the practice of being proactive so that the risk in question is not realized?


  1. Risk Mitigation
  2. Risk Acceptance
  3. Risk Avoidance
  4. Risk transfer
Correct answer: C



Question 6

Which of the following control is intended to discourage a potential attacker?


  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: A



Question 7

Which of the following security control is intended to avoid an incident from occurring?


  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: B



Question 8

Which of the following control fixes a component or system after an incident has occurred?


  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: C



Question 9

Which of the following security control is intended to bring environment back to regular operation?


  1. Deterrent
  2. Preventive
  3. Corrective
  4. Recovery
Correct answer: D



Question 10

Which of the following control helps to identify an incident’s activities and potentially an intruder?


  1. Deterrent 
  2. Preventive
  3. Detective
  4. Compensating
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files