Category «CISA»

Exam CISA: Certified Information Systems Auditor (update October 16th, 2017)

Which of the following types of firewall treats each network frame or packet in isolation?

Which of the following types of firewall treats each network frame or packet in isolation? A. statefull firewall B. hardware firewall C. combination firewall D. packet filtering firewall E. stateless firewall F. None of the choices. Explanation:A stateless firewall treats each network frame or packet in isolation. Such a firewall has no way ofknowing if …

Squid is an example of:

Squid is an example of: A. IDS B. caching proxy C. security proxy D. connection proxy E. dialer F. None of the choices. Explanation:Squid is an example of a caching proxy, not a security proxy. It has the main purpose of locallystoring copies of web pages that are popular, with the benefit of saving bandwidth. …

which of the following OSI layers are involved?

With Deep packet inspection, which of the following OSI layers are involved? A. Layer 2 through Layer 7 B. Layer 3 through Layer 7 C. Layer 2 through Layer 6 D. Layer 3 through Layer 6 E. Layer 2 through Layer 5 F. None of the choices. Explanation:Deep packet inspection (DPI) is a form of …

Pretexting is an act of:

Pretexting is an act of: A. DoS B. social engineering C. eavedropping D. soft coding E. hard coding F. None of the choices. Explanation:Pretexting is the act of creating and using an invented scenario to persuade a target to releaseinformation or perform an action and is usually done over the telephone. It is more than …

Which of the following refers to the act of creating and using an invented scenario to persuade a target to perform an action?

Which of the following refers to the act of creating and using an invented scenario to persuade atarget to perform an action? A. Pretexting B. Backgrounding C. Check making D. Bounce checking E. None of the choices. Explanation:Pretexting is the act of creating and using an invented scenario to persuade a target to releaseinformation or …

Relatively speaking, firewalls operated at the physical level of the seven-layer OSI model are:

Relatively speaking, firewalls operated at the physical level of the seven-layer OSI model are: A. almost always less efficient. B. almost always less effective. C. almost always less secure. D. almost always less costly to setup. E. None of the choices. Explanation:Early attempts at producing firewalls operated at the application level of the seven-layer OSI …

Relatively speaking, firewalls operated at the application level of the sevenlayer OSI model are:

Relatively speaking, firewalls operated at the application level of the sevenlayer OSI model are: A. almost always less efficient. B. almost always less effective. C. almost always less secure. D. almost always less costly to setup. E. None of the choices. Explanation:Early attempts at producing firewalls operated at the application level of the seven-layer OSI …

All Social Engineering techniques are based on flaws in:

All Social Engineering techniques are based on flaws in: A. human logic. B. hardware logic. C. software logic. D. device logic. E. group logic. F. None of the choices. Explanation:Social engineering is a collection of techniques used to manipulate people into performing actionsor divulging confidential information. While similar to a confidence trick or simple fraud, …

Which of the following may be deployed in a network as lower cost surveillance and early- warning tools?

Which of the following may be deployed in a network as lower cost surveillance and early- warningtools? A. Honeypots B. Hardware IPSs C. Hardware IDSs D. Botnets E. Stateful inspection firewalls F. Stateful logging facilities G. None of the choices. Explanation:Honeypots, essentially decoy network-accessible resources, could be deployed in a network assurveillance and early-warning tools. …