Book Image

CISA – Certified Information Systems Auditor Study Guide

By : Hemang Doshi
Book Image

CISA – Certified Information Systems Auditor Study Guide

By: Hemang Doshi

Overview of this book

Are you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.
Table of Contents (19 chapters)
1
Section 1: Information System Auditing Process
4
Section 2: Governance and Management of IT
7
Section 3: Information Systems Acquisition, Development, and Implementation
10
Section 4: Information System Operations and Business Resilience
13
Section 5: Protection of Information Assets

Assessments

You will find the answers to the questions in this section.

Network and endpoint devices

  1. Answer A: Fiber optic wires
    Explanation: Optical fiber is a thin and flexible piece of fiber made of glass or plastic. Fiber optic cables are considered to be more secure than copper wire. Fiber optic is the preferred choice for managing long-distance networks and handling high volumes of data. Fiber optics are not impacted or affected by EMI. Fiber optic cables have very marginal transmission loss.
  2. Answer C: A firewall.
    Explanation: A firewall is primarily installed as a security measure to prevent unauthorized traffic among the different segments of the network. Hubs, routers, and switches do have a limited capability to block traffic, but they are not primarily installed as a security measure.
  1. Answer B: Separate the VLANs for the conference and production environments.
    Explanation: An open connection point in the conference room is a risk as it can be accessed by anyone in the conference...