P.S. GoShikenがGoogle Driveで共有している無料かつ新しいCISAダンプ:https://drive.google.com/open?id=1GS0cfNuipnAqDwvMUAN6WMZXp82BcfiT
何事でもはじめが一番難しいです。CISA試験への復習に悩んでいますか?弊社の提供するソフトを買うのはあなたの必要の第一歩です。弊社の保証がある問題集を入手して、試験に合格するチャンスが大きくなります。疑問がありましたら、GoShikenで無料のデモをダウンロードしてやってみることができます。
CISA認定試験は、情報システムの監査、管理、セキュリティに関する候補者の知識をテストするように設計されています。この試験では、ITガバナンス、リスク管理、情報セキュリティ、監査プロセスなど、さまざまなトピックをカバーしています。試験は5つのドメインに分かれており、それぞれがIT監査の特定の領域をカバーしています。これらのドメインは、ITの情報システム監査プロセス、ガバナンスと管理、情報システムの習得、開発、実装、情報システムの運用、メンテナンス、および情報資産の保護です。 CISA認定試験に合格すると、IT監査に関する候補者の専門知識と専門能力開発へのコミットメントが示されています。
CISAトレーニング資料のPDFバージョンは読みやすく、覚えやすく、印刷リクエストをサポートしているため、紙で印刷して練習することができます。練習資料のソフトウェアバージョンは、シミュレーションテストシステムをサポートし、セットアップの時間を与えることには制限がありません。
質問 # 153
Depending on the complexity of an organization's business continuity plan (BCP), the plan may be developed as a set of more than one plan to address various aspects of business continuity and disaster recovery, in such an environment, it is essential that:
正解:A
解説:
Explanation/Reference:
Explanation:
Depending on the complexity of an organization, there could be more than one plan to address various aspects of business continuity and disaster recovery. These do not necessarily have to be integrated into one single plan. However, each plan has tobe consistent with other plans to have a viable business continuity planning strategy. It may not be possible to define a sequence in which plans have to be implemented, as it may be dependent on the nature of disaster, criticality, recovery time, etc.
質問 # 154
Which of the following is one most common way that spyware is distributed?
正解:D
解説:
Explanation/Reference:
One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads off the Web or a peer-to-peer file-trading network. When the user installs the software, the spyware is installed alongside.
質問 # 155
During an external review, an IS auditor observes an inconsistent approach in classifying system criticality within the organization. Which of the following should be recommended as the PRIMARY factor to determine system criticality?
正解:B
質問 # 156
Which of the following would be to MOST concern when determine if information assets are adequately safequately safeguarded during transport and disposal?
正解:A
質問 # 157
Which of the following statement INCORRECTLY describes device and where they sit within the TCP/IP model?
正解:B
解説:
Section: Information System Operations, Maintenance and Support
Explanation:
The keyword within the question is INCORRECTLY. You need to find out incorrect statement.
For your exam you should know below information about TCP/IP model:
Network models
Layer 4. Application Layer
Application layer is the top most layer of four layer TCP/IP model. Application layer is present on the top of the Transport layer. Application layer defines TCP/IP application protocols and how host programs interface with Transport layer services to use the network.
Application layer includes all the higher-level protocols like DNS (Domain Naming System), HTTP (Hypertext Transfer Protocol), Telnet, SSH, FTP (File Transfer Protocol), TFTP (Trivial File Transfer Protocol), SNMP (Simple Network Management Protocol), SMTP (Simple Mail Transfer Protocol) , DHCP (Dynamic Host Configuration Protocol), X Windows, RDP (Remote Desktop Protocol) etc.
Layer 3. Transport Layer
Transport Layer is the third layer of the four layer TCP/IP model. The position of the Transport layer is between Application layer and Internet layer. The purpose of Transport layer is to permit devices on the source and destination hosts to carry on a conversation. Transport layer defines the level of service and status of the connection used when transporting data.
The main protocols included at Transport layer are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
Layer 2. Internet Layer
Internet Layer is the second layer of the four layer TCP/IP model. The position of Internet layer is between Network Access Layer and Transport layer. Internet layer pack data into data packets known as IP datagram's, which contain source and destination address (logical address or IP address) information that is used to forward the datagram's between hosts and across networks. The Internet layer is also responsible for routing of IP datagram's.
Packet switching network depends upon a connectionless internetwork layer. This layer is known as Internet layer. Its job is to allow hosts to insert packets into any network and have them to deliver independently to the destination. At the destination side data packets may appear in a different order than they were sent. It is the job of the higher layers to rearrange them in order to deliver them to proper network applications operating at the Application layer.
The main protocols included at Internet layer are IP (Internet Protocol), ICMP (Internet Control Message Protocol), ARP (Address Resolution Protocol), RARP (Reverse Address Resolution Protocol) and IGMP (Internet Group Management Protocol).
Layer 1. Network Access Layer
Network Access Layer is the first layer of the four layer TCP/IP model. Network Access Layer defines details of how data is physically sent through the network, including how bits are electrically or optically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted pair copper wire.
The protocols included in Network Access Layer are Ethernet, Token Ring, FDDI, X.25, Frame Relay etc.
The most popular LAN architecture among those listed above is Ethernet. Ethernet uses an Access Method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection) to access the media, when Ethernet operates in a shared media. An Access Method determines how a host will place data on the medium.
IN CSMA/CD Access Method, every host has equal access to the medium and can place data on the wire when the wire is free from network traffic. When a host wants to place data on the wire, it will check the wire to find whether another host is already using the medium. If there is traffic already in the medium, the host will wait and if there is no traffic, it will place the data in the medium. But, if two systems place data on the medium at the same instance, they will collide with each other, destroying the data. If the data is destroyed during transmission, the data will need to be retransmitted. After collision, each host will wait for a small interval of time and again the data will be retransmitted.
Protocol Data Unit (PDU):
The following answers are incorrect:
The other options correctly describe about network device functioning based on TCP/IP model Reference:
CISA review manual 2014 page number 272
質問 # 158
......
CISAガイド資料の改革に関する専門家の絶え間ない努力により、CISAテストの準備中に最短時間で集中してターゲットを絞ることができ、複雑で曖昧なコンテンツを簡素化できます。 。私たちGoShikenのCISA研究急流の助けを借りて、あなたは同じ時間でより有用な何かをするためにあなたのフラグメント時間を最大限に活用することを学ぶので、あなたはあなたの仲間の労働者よりも独特です。弊社のCISA模擬テストの上記のすべてのサービスにより、より多くの時間、省エネ、省力化を実現できます。
CISA合格率書籍: https://www.goshiken.com/ISACA/CISA-mondaishu.html
無料でクラウドストレージから最新のGoShiken CISA PDFダンプをダウンロードする:https://drive.google.com/open?id=1GS0cfNuipnAqDwvMUAN6WMZXp82BcfiT