Sei sulla pagina 1di 3

CISA 2008 IT Service Delivery - Practice Questions

1. Which of the following devices extends the network and has the capacity to
store frames and act as a storage and forward device?
A. Router
B. Bridge
C. Repeater
D. Gateway

2. In a web server, a common gateway interface (CGI) is MOST often used as:
A. consistent way for transferring data to the application program and back to
the user.
B. computer graphics imaging method for movies and TV.
C. graphic user interface for web design.
D. interface to access the private gateway domain.

3. In a TCP/IP-based network, an IP address specifies a:


A. network connection
B. router/gateway
C. computer in the network
D. device on the network

4. Which of the following is critical to the selection and acquisition of the


correct operating system software?
A. Competitive bids
B. User department approval
C. Hardware-configuration analysis
D. Purchasing department approval

5. Which of the following is a network architecture configuration that links


each station directly to a main hub?
A. Bus
B. Ring
C. Star
D. Completed connected

6. The planning and monitoring of computer resources to ensure that they are
being used efficiently and effectively is:
A. hardware monitoring
B. capacity management
C. network management
D. job scheduling

7. Which of the following translates e-mail formats from one network to


another so that the message can travel through all the networks?
A. Gateway
B. Protocol converter
C. Front-end communication processor

Jose Sabater
CISA 2008 IT Service Delivery - Practice Questions

D. Concentrator/multiplexor

8. Which of the following types of firewalls provide the GREATEST degree and
granularity of control?
A. Screening router
B. Packet filter
C. Application gateway
D. Circuit gateway

9. Connection-oriented protocols in the TCP/IP suite are implemented in the:


A. transport layer
B. application layer
C. physical layer
D. network layer

10. Which of the following is widely accepted as one of the critical components in
networking management?
A. Configuration management
B. Topological mappings
C. Application of monitoring tools
D. Proxy server trouble shooting

11. The most likely error to occur when implementing a firewall is:
A. incorrectly configuring the access lists
B. compromising the passwords due to social engineering
C. connecting a modem to the computers in the network
D. inadequately protecting the network and server from virus attacks

12. Which of the following is the MOST effective means of determining which
controls are functioning properly in an operating system?
A. Consulting with the vendor
B. Reviewing the vendor installation guide
C. Consulting with the system programmer
D. Reviewing the system generation parameters

13. Which of the following line media would provide the BEST security for a
telecommunication network?
A. Broad band network digital transmission
B. Baseband network
C. Dial-up
D. Dedicated lines

14. Which of the ISO/OSI model layers provides for routing packets between
nodes?
A. Data link
B. Network

Jose Sabater
CISA 2008 IT Service Delivery - Practice Questions

C. Transport
D. Session

15. Which of the following LAN physical layouts is subject to total loss if one
device fails?
A. Star
B. Bus
C. Ring
D. Completely connected

16. Which of the following hardware devices relieves the central computer from
performing network control, format conversion and message handling tasks?
A. Spool
B. Cluster controller
C. Protocol converter
D. Front end processor

17. Which of the following controls will detect MOST effectively the presence of
bursts of errors in network transmissions?
A. Parity check
B. Echo check
C. Block sum check
D. Cyclic redundancy check

18. When reviewing the implementation of a LAN the IS auditor should FIRST
review the:
A. node list
B. acceptance test report
C. network diagram
D. users list

19. Which of the following is a control over component communication


failure/errors?
A. Restricting operator access and maintaining audit trails
B. Monitoring and reviewing system engineering activity
C. Providing network redundancy
D. Establishing physical barriers to the data transmitted over the network

Jose Sabater

Potrebbero piacerti anche