ISA 3.0 ICAI QUESTION BANK

ISA 3.0 ICAI QUESTION BANK : ICAI MODULE 5

Study material Based

ICAI DISA 3.0 QUESTION BANK : MODULE 5 :- STUDY MATERIAL BASED

1 / 50

Which of the following is a type of malware that does not use system resources for execution of malicious codes?

2 / 50

Social engineering attacks can best be prevented by:

3 / 50

Most web based application attacks can be prevented by:

4 / 50

Which of the following is most important while performing penetration testing?

5 / 50

The intrusion detection monitoring on a host for data integrity attack by malicious software is a:

6 / 50

Primary function of Security operations center (SOC) is to:

7 / 50

Cryptographic checksum is a network control that:

8 / 50

While auditing organization’s network which of the following control IS auditor must verify first?

9 / 50

Message digest helps organization in getting assurance on:

10 / 50

Which of the following is a method used to gather information about the communication network?

11 / 50

Which of the following is a primary objective of implementing logical access controls?

12 / 50

Which of the following attack to break the user password is difficult to control?

13 / 50

One-time password is considered strong because they are:

14 / 50

While auditing compliance with password policy, IS auditor observed that configuration of password parameters in system is as per information security policy. Which of the following the auditor should verify?

15 / 50

Which of following processes in user access management is most essential to detect errors and omissions resulting in unauthorized or excess accesses to users?

16 / 50

Which of the following non-compliance with information security policy is most difficult to detect or get evidence for?

17 / 50

Which of the following is a major concern associated with Single-Sign-on?

18 / 50

Mandatory access controls are those controls that are:

19 / 50

Which of the following is primary requirement of granting user access to information asset?

20 / 50

Which of the following pair of authentications can be considered as two factors?

21 / 50

Which of the following is main reason for not allowing mobile devices into data center?

22 / 50

While selecting site for a data center which of the site is best to be selected?

23 / 50

Automated access controls open doors based on access cards, pins, and/or biometric devices and are powered by electricity. Which of the following is the best policy in case of power failure?

24 / 50

What are the problems that may be caused by humidity in an area with electrical devices?

25 / 50

Which of the following evidence is best to provide assurance on automated environmental controls?

26 / 50

Which of the following is a major concern associated with biometric physical access control?

27 / 50

Which of the following is the main reason for appointing human guards at main entrance of facilities?

28 / 50

Primary purpose of access controlled dead man door, turnstile, mantrap is to:

29 / 50

Which of the following are most important controls for unmanned data center?

30 / 50

Which of the following is first action when a fire detection system raises the alarm?

31 / 50

Which of the following best helps in classifying the information within organizations?

32 / 50

Classification of information is primarily based on:

33 / 50

Which of the following is Primary purpose of Information classification?

34 / 50

Which of the following is a concern for compliance with information security policy?

35 / 50

Which of the following is best evidence indicting support and commitment of senior management for information security initiatives?

36 / 50

Which of the following is primary reason for periodic review of security policy?

37 / 50

Protecting integrity of data primarily focuses on

38 / 50

Information security policies are set of various policies addressing different information systems areas based on the IT infrastructure of organization. Which of the following policy is most common in all organizations?

39 / 50

Which of the following is primary function of information security policies?

40 / 50

The Primary objective of implementing Information security management is to:

41 / 50

Which of the following shall best help in aligning IT risk with enterprise risk?

42 / 50

The quantum of risk after enterprise has implemented controls based on risk mitigation plan is:

43 / 50

While auditing risk monitoring process which of the following IS auditor should review FIRST?

44 / 50

Which of the following is a risk factor that may have impact on organization?

45 / 50

Of the following, who is accountable for deciding and implementing controls based on risk mitigation plan?

46 / 50

Main use of maintaining and updating risk register is to:

47 / 50

Organizations capacity to sustain loss due to uncertainty and expressed in monetary terms is best known as:

48 / 50

After a Tsunami, a business decides to shift the location of data centre from coastal area to mid land. Which type of risk response option it has exercised?

49 / 50

Which of the following is a risk response option?

50 / 50

Which of the following shall BEST help in deciding upon the protection level for information asset?

Your score is

The average score is 63%

0%

Related Post

GST Appeal: Filing procedure & Physical document submission#1In “GST”

Extended Timelines for issuance of Notice and order under section 73 and 74 of GST Act.In “GST”

Affidavit for GST Registration

YouTaxClub
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart