Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 333

Mary Smith

Sun, 19 Apr 2026

CISA—Certified Information Systems Auditor - Part 333

1. 'Nowadays, computer security comprises mainly 'preventive'' measures.'

A) True
B) True only for trusted networks
C) True only for untrusted networks
D) False
E) None of the choices.


2. The majority of software vulnerabilities result from a few known kinds of coding defects, such as (Choose five.):(Select 5answers)

A) buffer overflows
B) format string vulnerabilities
C) integer overflow
D) code injection
E) command injection
F) None of the choices.

3. ALL computer programming languages are vulnerable to command injection attack.

A) True
B) False
C)
D)



4. Which of the following refers to an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer?

A) buffer overflow
B) format string vulnerabilities
C) integer misappropriation
D) code injection
E) None of the choices.


5. Buffer overflow aims primarily at corrupting:

A) system processor
B) network firewall
C) system memory
D) disk storage
E) None of the choices.


1. Right Answer: A
Explanation: Nowadays, computer security comprises mainly 'preventive' measures, like firewalls or an Exit Procedure. A firewall can be defined as a way of filtering network data between a host or a network and another network and is normally implemented as software running on the machine or as physical integrated hardware.

2. Right Answer: A,B,C,D,E
Explanation: The majority of software vulnerabilities result from a few known kinds of coding defects. Common software defects include buffer overflows, format string vulnerabilities, integer overflow, and code/command injection. Some common languages such as C and C++ are vulnerable to all of these defects. Languages such as Java are immune to some of these defects but are still prone to code/ command injection and other software defects which lead to software vulnerabilities.

3. Right Answer: B
Explanation: The majority of software vulnerabilities result from a few known kinds of coding defects. Common software defects include buffer overflows, format string vulnerabilities, integer overflow, and code/command injection. Some common languages such as C and C++ are vulnerable to all of these defects. Languages such as Java are immune to some of these defects but are still prone to code/ command injection and other software defects which lead to software vulnerabilities.

4. Right Answer: A
Explanation: A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data.

5. Right Answer: C
Explanation: A buffer overflow is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent memory locations. The overwritten data may include other buffers, variables and program flow data.

0 Comments

Leave a comment