FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2022-02-26.q471 Dumps
  • ««
  • «
  • …
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • …
  • »
  • »»
Download Now

Question 226

Which of the following BEST reduces the ability of one device to capture the packets that are meant for
another device?

Correct Answer: B
Section: Protection of Information Assets
Explanation:
Switches are at the lowest level of network security and transmit a packet to the device to which it is
addressed. This reduces the ability of one device to capture the packets that are meant for another device.
Filters allow for some basic isolation of network traffic based on the destination addresses. Routers allow
packets to be given or denied access based on the addresses of the sender and receiver and the type of
packet. Firewalls are a collection of computer and network equipment used to allow communications to
flow out of the organization and restrict communications flowing into the organization.
insert code

Question 227

Which of the following reduces the potential impact of social engineering attacks?

Correct Answer: C
Because social engineering is based on deception of the user, the best countermeasure or defense is a security awareness program. The other choices are not user-focused.
insert code

Question 228

Which of the following attack includes social engineering, link manipulation or web site forgery techniques?

Correct Answer: C
Section: Protection of Information Assets
Explanation/Reference:
Phishing technique include social engineering, link manipulation or web site forgery techniques.
For your exam you should know the information below:
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card
details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic
communication. Communications purporting to be from popular social web sites, auction sites, banks,
online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing
emails may contain links to websites that are infected with malware. Phishing is typically carried out by
email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look
and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques
used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal
with the growing number of reported phishing incidents include legislation, user training, public awareness,
and technical security measures.
Spear phishing - Phishing attempts directed at specific individuals or companies have been termed spear
phishing. Attackers may gather personal information about their target to increase their probability of
success.
Link manipulation
Most methods of phishing use some form of technical deception designed to make a link in an email (and
the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use
of sub domains are common tricks used by phishes. In the following example URL, http://
www.yourbank.example.com/, it appears as though the URL will take you to the example section of the
your bank website; actually this URL points to the "your bank" (i.e. phishing) section of the example
website. Another common trick is to make the displayed text for a link (the text between the tags) suggest a
reliable destination, when the link actually goes to the phishes' site. The following example link, //
en.wikipedia.org/wiki/Genuine, appears to direct the user to an article entitled "Genuine"; clicking on it will in
fact take the user to the article entitled "Deception". In the lower left hand corner of most browsers users
can preview and verify where the link is going to take them. Hovering your cursor over the link for a couple
of seconds may do a similar thing, but this can still be set by the phishes through the HTML tooltip tag.
Website forgery
Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript
commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL
over the address bar, or by closing the original bar and opening up a new one with the legitimate URL.
An attacker can even use flaws in a trusted website's own scripts against the victim. These types of attacks
(known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their
bank or service's own web page, where everything from the web address to the security certificates
appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to
spot without specialist knowledge.
The following answers are incorrect:
Smurf Attack - Occurs when mix-configured network device allow packet to be sent to all hosts on a
particular network via the broadcast address of the network
Traffic analysis - is the process of intercepting and examining messages in order to deduce information
from patterns in communication. It can be performed even when the messages are encrypted and cannot
be decrypted. In general, the greater the number of messages observed, or even intercepted and stored,
the more can be inferred from the traffic. Traffic analysis can be performed in the context of military
intelligence, counter-intelligence, or pattern-of-life analysis, and is a concern in computer security.
Interrupt attack- Interrupt attack occurs when a malicious action is performed by invoking the operating
system to execute a particular system call.
Following reference(s) were/was used to create this question:
CISA review manual 2014 Page number 323
Official ISC2 guide to CISSP CBK 3rd Edition Page number 493
http://en.wikipedia.org/wiki/Phishing
insert code

Question 229

To ensure an organization is complying with privacy requirements, an IS auditor should FIRST review:

Correct Answer: C
Explanation/Reference:
Explanation:
To ensure that the organization is complying with privacy issues, an IS auditor should address legal and regulatory requirements first. To comply with legal and regulatory requirements, organizations need to adopt the appropriate infrastructure. After understanding the legal and regulatory requirements, an IS auditor should evaluate organizational policies, standards and procedures to determine whether they adequately address the privacy requirements, and then review the adherence to these specific policies, standards and procedures.
insert code

Question 230

The BEST way to preserve data integrity through all phases of application containerization is to ensure which of the following?

Correct Answer: B
insert code
  • ««
  • «
  • …
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2022-02-26.q471 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.