exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 997 discussion

Actual exam question from Isaca's CISA
Question #: 997
Topic #: 1
[All CISA Questions]

An IS auditor reviewing an information processing environment decides to conduct external penetration testing. Which of the following is MOST appropriate to include in the audit scope for the organization to distinguish between the auditor's penetration attacks and actual attacks?

  • A. Restricted host IP addresses of simulated attacks
  • B. Testing techniques of simulated attacks
  • C. Source IP addresses of simulated attacks
  • D. Timing of simulated attacks
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
FAGFUR
5 months, 1 week ago
Selected Answer: C
When conducting external penetration testing, the source IP addresses of simulated attacks are the most appropriate to include in the audit scope to distinguish between the auditor's penetration attacks and actual attacks. This information helps differentiate between simulated testing activities and real-world malicious activities. By documenting and providing the source IP addresses of simulated attacks, the organization can easily identify and filter out the auditor's activities during the analysis of logs and security monitoring systems. This ensures that the organization can distinguish between intentional testing and potential actual attacks, allowing for a more accurate assessment of the information processing environment. The other options may provide valuable information, but the source IP addresses specifically help in differentiating between the simulated attacks conducted by the auditor and any real attacks that might occur during the testing period.
upvoted 1 times
...
Staanlee
1 year, 3 months ago
Selected Answer: C
The correct answer is C, Source IP addresses of simulated attacks. External penetration testing is a type of security testing that involves simulating an attack on an organization's systems and infrastructure from outside the organization's network. To distinguish between the auditor's penetration attacks and actual attacks, the IS auditor should include the source IP addresses of the simulated attacks in the audit scope for the organization. This will enable the organization to identify the source of any suspicious activity or attempted attacks and determine whether they are coming from the auditor or from an external threat actor.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago