New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 8 Question 69 Discussion

Actual exam question for Isaca's CISA exam
Question #: 69
Topic #: 8
[All CISA Questions]

When auditing the security architecture of an online application, an IS auditor should FIRST review the:

Show Suggested Answer Hide Answer
Suggested Answer: A

This is according to the ISACA's IS Auditing Guideline G15 on Security Awareness Training, which states that security awareness training should include 'an understanding of the types of suspicious activity and the appropriate response to them'.


Contribute your Thoughts:

0/2000 characters
Twana
3 months ago
Surprised that people overlook firewall standards!
upvoted 0 times
...
Nelida
3 months ago
Wait, isn’t the location of the firewall super important too?
upvoted 0 times
...
Kenneth
3 months ago
Agreed, configuration is key to security!
upvoted 0 times
...
Tiffiny
4 months ago
I think the firmware version is more critical first.
upvoted 0 times
...
Germaine
4 months ago
Definitely should start with the firewall configuration.
upvoted 0 times
...
Edelmira
4 months ago
The location of the firewall is definitely something we discussed, but I wonder if it really comes first in the audit process.
upvoted 0 times
...
Elenore
4 months ago
I feel like the firmware version could be important too, but I can't recall if it should be prioritized over the configuration.
upvoted 0 times
...
Josphine
4 months ago
I remember a practice question where we had to check the configuration first. It seems like that might be more critical than just looking at the standards.
upvoted 0 times
...
Pura
5 months ago
I think we should start with the firewall standards since they set the guidelines for security. But I'm not entirely sure if that's the first step.
upvoted 0 times
...
Brittni
5 months ago
Okay, I think I've got this. The key here is to focus on the fundamentals - the firewall standards would be the logical place to start, since that will set the baseline for how the firewall should be configured and deployed.
upvoted 0 times
...
Coral
5 months ago
Hmm, I'm a little unsure about this one. I know the firewall is important for security, but I'm not sure if the configuration or the standards would be the first thing to look at. Maybe the location of the firewall in the network would give me a better overall picture?
upvoted 0 times
...
Keith
5 months ago
This seems like a pretty straightforward question about auditing a firewall. I'd start by reviewing the firewall configuration to see how it's set up and what rules are in place.
upvoted 0 times
...
Ming
5 months ago
I'm a bit confused by this question. Is it asking about the firewall itself, or the overall security architecture of the application? I'd want to make sure I understand the scope before diving in.
upvoted 0 times
...
Brice
5 months ago
I'm a bit confused by this question. The image and options don't seem to align with what I've learned about confederation configurations. I'll need to review my notes and try to make sense of this.
upvoted 0 times
...
Ernest
5 months ago
I'm pretty confident the answer is C. Cloning a running VM to a new VM is the standard way to create a copy in the vSphere Client. The other options don't seem to match the specifics of the question.
upvoted 0 times
...
James
5 months ago
I'm pretty sure it's the smart card option, but I'll double-check my notes just to be sure.
upvoted 0 times
...
Kenneth
5 months ago
This is a good test of our OPSEC knowledge. I'm feeling confident I can identify the three correct answers from the options provided.
upvoted 0 times
...
Marge
5 months ago
Okay, I think I've got this. In a multi-echelon network, having safety stock at the central and field warehouses would provide the highest customer service levels. The central warehouse can buffer against variability in demand, while the field warehouses can respond quickly to local customer needs. I'm confident this is the right answer.
upvoted 0 times
...
Mollie
5 months ago
Okay, let me think this through. We want to know when all the instances are unhealthy, so the condition should be when the UnhealthyHostCount is greater than or equal to 1. That's option B.
upvoted 0 times
...
Almeta
10 months ago
Hmm, I'd say the answer is 'All of the above'... and a pack of donuts for the auditor. Gotta keep 'em happy, right?
upvoted 0 times
Allene
9 months ago
C) firmware version of the firewall
upvoted 0 times
...
Weldon
9 months ago
B) configuration of the firewall
upvoted 0 times
...
Ronnie
9 months ago
A) firewall standards.
upvoted 0 times
...
...
Dominque
10 months ago
Firewall standards, all the way! Gotta make sure it's playing by the rules, otherwise it's like trying to drive with a flat tire.
upvoted 0 times
...
Dorothy
10 months ago
Location, location, location! The firewall's gotta be in the right spot to do its job. Just like a good real estate agent!
upvoted 0 times
Kris
9 months ago
D) location of the firewall within the network
upvoted 0 times
...
Deangelo
9 months ago
B) configuration of the firewall
upvoted 0 times
...
Karima
10 months ago
A) firewall standards.
upvoted 0 times
...
...
Caitlin
10 months ago
Ooh, the firmware version! That's like checking the engine before you drive, right? Gotta make sure it's running smooth.
upvoted 0 times
Erick
9 months ago
It's like checking the locks on your doors before leaving the house.
upvoted 0 times
...
Glendora
9 months ago
Definitely, you want to ensure that the firewall is up-to-date and secure.
upvoted 0 times
...
Kimbery
9 months ago
I agree, it's like making sure the foundation is strong before building on top of it.
upvoted 0 times
...
Remona
10 months ago
Yes, checking the firmware version is crucial for security.
upvoted 0 times
...
...
James
11 months ago
Hmm, I'd say the firewall configuration is the way to go. That's where the rubber meets the road, you know?
upvoted 0 times
Paulina
9 months ago
D) location of the firewall within the network
upvoted 0 times
...
Tori
9 months ago
C) firmware version of the firewall
upvoted 0 times
...
Teddy
9 months ago
B) configuration of the firewall
upvoted 0 times
...
Artie
9 months ago
A) firewall standards.
upvoted 0 times
...
...
Henriette
11 months ago
But if the firewall standards are not up to date, it could lead to vulnerabilities. That's why I think it should be reviewed first.
upvoted 0 times
...
Penney
11 months ago
I disagree, I believe the configuration of the firewall is more important to review first.
upvoted 0 times
...
Henriette
11 months ago
I think the first thing to review should be the firewall standards.
upvoted 0 times
...

Save Cancel