MY CISA Flashcards
Accountability for the maintenance of appropriate security measures over information assets resides with the:
Management should ensure that all information assets (data and systems) have an appointed owner who makes decisions about classification and access rights. System owners typically delegate day-to-day custodianship to the systems delivery/operations group and security responsibilities to a security administrator. Owners, however, remain accountable for the maintenance of appropriate security measures.
An ADVANTAGE of the use of hot sites as a backup alternative is that:
Hot sites can be made ready for operation normally within hours. However, the use of hot sites is expensive, should not be considered as a long-term solution, and requires that equipment and systems software be compatible with the primary installation being backed up.
An advantage of using unshielded twisted-pair (UTP) cable for data communication over other copper- based cables is that UTP cable:
The use of UTP in copper will reduce the likelihood of crosstalk. While the twisted nature of the media will reduce sensitivity to electromagnetic disturbances, an unshielded copper wire does not provide adequate protection against wiretapping. Attenuation sets in if copper twisted-pair cable is used for longer than 100 meters, necessitating the use of a repeater. The tools and techniques to install UTP are not simpler or easier than other copper-based cables.
After a disaster declaration, the media CREATION date at a warm recovery site is based on the:
RPO
RPO is determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interruption. The media creation date will reflect the point to which data are to be restored or the RPO.
After a full operational contingency test, an IS auditor performs a review of the recovery steps. The IS auditor concludes that the time it took for the technological environment and systems to return to full-functioning exceeded the required critical recovery time. Which of the following should the IS auditor recommend?
(1) Performing an exhaustive review of the recovery tasks would be appropriate to identify the way these tasks were performed
(2) identify the time allocated to each of the steps required to accomplish recovery
(3) AND determine where adjustments can be made.
Analysis and resolution ARE PERFORMED AFTER
logging and triage have been performed.
Atomicity GUARANTEES
that either the ENTIRE transaction is processed or NONE of it is
Authorization tables ARE USED TO VERIFY
implementation of logical access controls
Availability reports INACTIVITY, such as DOWNTIME, and provides
the time periods during which the computer was available for utilization by users or other processes
A benefit of Quality of Service (QoS) is that the PARTICIPATING APPLICATIONS
will have bandwidth guaranteed.
The BEST audit procedure to determine if unauthorized changes have been made to production code is to:
EXAMINE CHANGE CONTROL RECORDS AND COMPARE TO OBJECT CODE
The procedure of examining object code files to establish instances of code changes and tracing these back to change control system records is a substantive test that directly addresses the risk of unauthorized code changes.
The BEST audit procedure to determine if unauthorized changes have been made to production code is to:
examine object code to find instances of changes and trace them back to change control records.
Check digits DETECT
transposition and transcription errors.
Commitment and rollback controls ARE DIRECTLY RELEVANT TO
integrity.
These controls ensure that database operations that form a logical transaction unit will complete in its entirety or not at all.. Rollback ensures that the already completed processing is reversed back, and the data already processed are not saved to the disk in the event of the failure of the completion of the transaction processing.
CONCURRENCY control is a database management systems (DBMS) concept that is used to address CONFLICTS
with the simultaneous accessing or altering of data that can occur with a multi-user system.
Configuration management is widely accepted as on of the KEY COMPONENTS of
any network, since it establishes how the network will function internally and externally. It also deals with the management of configuration and monitoring performance.
Consistency ENSURES that the database is
in a legal state when the transaction begins and ends.
A contingency plan deals with ways to RECOVER from an unexpected failure, but it DOES NOT
address the identification or prevention of cyberattacks.
A continuity of operations plan (COOP)
addresses the subset of an organization’s missions that are deemed most critical and contains procedures to sustain these functions at an alternate site for a short time period.
Cross-site scripting (CSS) involves the COMPROMISE of the web page to
redirect users to content on the attacker web site.
A Cyclic Redundancy Check (CRC) is commonly used to determine the:
accuracy of blocks of data transfers, such as data transfer from hard disks, is validated by a CRC
Determining the Service Delivery Objective (SDO) should be based PRIMARILY on:
BUSINESS NEED.
The SDO is the level of service to be reached during the alternate process mode until the normal situation is restored. This is directly related to the business needs.
A disaster recovery plan for an organization’s financial system specifies that the Recovery Point Objective (RPO) is zero and the Recovery Time Objective (RTO) is 72 hours. Which of the following is the MOST cost-effective solution?
The synchronous copy of the storage achieves the RPO, and a warm site operational in 48 hours meets the required RTO.
Asynchronous updates of the database in distributed locations do not meet the RPO.
Synchronous updates of the data and standby active systems in a hot site meet the RPO and RTO requirements but are more costly than a warm site solution.
A DISASTER RECOVERY PLAN (DRP) test should test
(1) the plan,
(2) processes
(3) people
(4) and IT systems.