Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 331

Mary Smith

Sun, 19 Apr 2026

CISA—Certified Information Systems Auditor - Part 331

1. Which of the following will replace system binaries and/or hook into the function calls of the operating system to hide the presence of other programs (choose the most precise answer)?

A) rootkits
B) virus
C) trojan
D) tripwire
E) None of the choices.


2. Which of the following types of attack makes use of common consumer devices that can be used to transfer data surreptitiously?

A) Direct access attacks
B) Indirect access attacks
C) Port attack
D) Window attack
E) Social attack
F) None of the choices.

3. Which of the following types of attack almost always requires physical access to the targets?

A) Direct access attack
B) Wireless attack
C) Port attack
D) Window attack
E) System attack
F) None of the choices.

4. Which of the following methods of encryption has been proven to be almost unbreakable when correctly used?

A) key pair
B) Oakley
C) certificate
D) 3-DES
E) one-time pad
F) None of the choices.

5. Which of the following encryption methods uses a matching pair of key-codes, securely distributed, which are used once-and-only-once to encode and decode a single message?

A) Blowfish
B) Tripwire
C) certificate
D) DES
E) one-time pad
F) None of the choices.

1. Right Answer: A
Explanation: A backdoor may take the form of an installed program (e.g., Back Orifice) or could be in the form of an existing 'legitimate' program, or executable file. A specific form of backdoors are rootkits, which replaces system binaries and/or hooks into the function calls of the operating system to hide the presence of other programs, users, services and open ports.

2. Right Answer: A
Explanation: Direct access attacks make use of common consumer devices that can be used to transfer data surreptitiously. Someone gaining physical access to a computer can install all manner of devices to compromise security, including operating system modifications, software worms, keyboard loggers, and covert listening devices. The attacker can also easily download large quantities of data onto backup media or portable devices.

3. Right Answer: A
Explanation: Direct access attacks make use of common consumer devices that can be used to transfer data surreptitiously. Someone gaining physical access to a computer can install all manner of devices to compromise security, including operating system modifications, software worms, keyboard loggers, and covert listening devices. The attacker can also easily download large quantities of data onto backup media or portable devices.

4. Right Answer: E
Explanation: It's possible to protect messages in transit by means of cryptography. One method of encryption - the one-time pad --has been proven to be unbreakable when correctly used. This method uses a matching pair of key- codes, securely distributed, which are used once-and-only-once to encode and decode a single message. Note that this method is difficult to use securely, and is highly inconvenient as well.

5. Right Answer: E
Explanation: It's possible to protect messages in transit by means of cryptography. One method of encryption - the one-time pad - has been proven to be unbreakable when correctly used. This method uses a matching pair of key- codes, securely distributed, which are used once-and-only-once to encode and decode a single message. Note that this method is difficult to use securely, and is highly inconvenient as well.

0 Comments

Leave a comment