CISA-CN Exam Question 36
在對組織在其客戶服務聊天機器人中使用人工智慧的情況進行審計時,資訊系統審計師應主要關注以下方面:
Correct Answer: A
Comprehensive and Detailed Step-by-Step Explanation:
Theprimary concernwhen auditing an AI-powered chatbot is ensuring thesafeguarding of personal datato comply with privacy regulations such asGDPR, CCPA, and ISO 27701. AI chatbots process customer inquiries, often handling sensitive personal data.
* Safeguarding of Personal Data (Correct Answer - A)
* Ensures compliance with data protection laws.
* Reduces the risk of unauthorized access or data leakage.
* Example:An AI chatbot collecting customer financial information must follow encryption and access control policies.
* Compliance with Industry Standards (Incorrect - B)
* Important, but protecting customer data takes priority over general compliance.
* Speed and Accuracy of Chatbot Responses (Incorrect - C)
* A performance metric, but not a primary audit focus.
* AI's Ability to Handle Multiple Queries (Incorrect - D)
* Efficiency metric, but does not address security risks.
References:
* ISACA CISA Review Manual
* ISO 27701 (Privacy Information Management System)
* GDPR & CCPA Compliance Guidelines
Theprimary concernwhen auditing an AI-powered chatbot is ensuring thesafeguarding of personal datato comply with privacy regulations such asGDPR, CCPA, and ISO 27701. AI chatbots process customer inquiries, often handling sensitive personal data.
* Safeguarding of Personal Data (Correct Answer - A)
* Ensures compliance with data protection laws.
* Reduces the risk of unauthorized access or data leakage.
* Example:An AI chatbot collecting customer financial information must follow encryption and access control policies.
* Compliance with Industry Standards (Incorrect - B)
* Important, but protecting customer data takes priority over general compliance.
* Speed and Accuracy of Chatbot Responses (Incorrect - C)
* A performance metric, but not a primary audit focus.
* AI's Ability to Handle Multiple Queries (Incorrect - D)
* Efficiency metric, but does not address security risks.
References:
* ISACA CISA Review Manual
* ISO 27701 (Privacy Information Management System)
* GDPR & CCPA Compliance Guidelines
CISA-CN Exam Question 37
根據最佳實踐,應停用哪些類型的帳戶進行互動式登入?
Correct Answer: D
Comprehensive and Detailed Step-by-Step Explanation:
Service accountsare used by applications or systems to perform automated tasks and shouldnot be allowed for interactive login, as they present security risks if compromised.
* Service Accounts (Correct Answer - D)
* Used for running background tasks (e.g., database services, scheduled jobs).
* Should have minimal permissions and be denied interactive logins.
* Example:A compromised service account with interactive login could allow attackers to gain system access.
* Local Accounts (Incorrect - A)
* Local administrator accounts should be restricted but may still be required for some systems.
* Administrator Accounts (Incorrect - B)
* Should be restricted, but disabling them entirely could lock out system management.
* Console Accounts (Incorrect - C)
* Console access is sometimes needed for system recovery and troubleshooting.
References:
* ISACA CISA Review Manual
* NIST 800-63B (Digital Identity Guidelines)
* CIS (Center for Internet Security) Best Practices
Service accountsare used by applications or systems to perform automated tasks and shouldnot be allowed for interactive login, as they present security risks if compromised.
* Service Accounts (Correct Answer - D)
* Used for running background tasks (e.g., database services, scheduled jobs).
* Should have minimal permissions and be denied interactive logins.
* Example:A compromised service account with interactive login could allow attackers to gain system access.
* Local Accounts (Incorrect - A)
* Local administrator accounts should be restricted but may still be required for some systems.
* Administrator Accounts (Incorrect - B)
* Should be restricted, but disabling them entirely could lock out system management.
* Console Accounts (Incorrect - C)
* Console access is sometimes needed for system recovery and troubleshooting.
References:
* ISACA CISA Review Manual
* NIST 800-63B (Digital Identity Guidelines)
* CIS (Center for Internet Security) Best Practices
CISA-CN Exam Question 38
有效鼓勵最有效使用IS資源的收費方法是:
Correct Answer: A
The charging method for IS resources is the way that the IS function allocates its costs to the users or business units that consume its services. The charging method can affect the behavior and incentives of the users and the IS function, as well as the efficiency and effectiveness of the IS resources. Therefore, choosing an appropriate charging method is an important decision for the IS function and its stakeholders.
One of the possible charging methods is to charge specific costs that can be tied back to specific usage. This means that the IS function tracks and measures the actual consumption of each user or business unit for each IS service, and charges them accordingly. For example, if a user uses 10 GB of storage space, 5 hours of CPU time, and 100 MB of network bandwidth, the IS function will charge them based on the unit costs of these resources. This charging method has the advantage of encouraging the most efficient use of IS resources, as it provides clear and accurate feedback to the users about their consumption and costs, and motivates them to optimize their usage and avoid waste or overuse. This charging method also aligns the interests of the IS function and the users, as both parties benefit from reducing costs and improving efficiency.
The other possible charging methods are:
Total utilization to achieve full operating capacity: This means that the IS function charges a fixed amount to each user or business unit based on their proportion of the total operating capacity of the IS resources. For example, if a user or business unit has 10% of the total computing power allocated to them, they will pay 10% of the total IS costs. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency. This charging method also creates a mismatch between the interests of the IS function and the users, as the IS function benefits from increasing costs and capacity, while the users bear the burden of paying for them.
Residual income in excess of actual incurred costs: This means that the IS function charges a markup or profit margin on top of its actual incurred costs to each user or business unit.For example, if a user or business unit consumes $100 worth of IS resources, the IS function will charge them $120, where $20 is the residual income for the IS function. This charging method has the disadvantage of discouraging efficient use of IS resources, as it increases the costs for the users and reduces their value for money. This charging method also creates a conflict between the interests of the IS function and the users, as the IS function benefits from increasing costs and profits, while the users suffer from paying more than they should.
Allocations based on the ability to absorb charges: This means that the IS function charges different amounts to different users or business units based on their ability to pay or their profitability. For example, if a user or business unit is more profitable or has a higher budget than another user or business unit, they will pay more for the same amount of IS resources. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency. This charging method also creates an unfair and arbitrary distribution of costs among the users or business units, as some paymore than others for no valid reason. References: 1: Charging Methods for IT Services - IT Process Wiki 2: IT Chargeback Methods - CIO Wiki 3: IT Chargeback - Wikipedia
One of the possible charging methods is to charge specific costs that can be tied back to specific usage. This means that the IS function tracks and measures the actual consumption of each user or business unit for each IS service, and charges them accordingly. For example, if a user uses 10 GB of storage space, 5 hours of CPU time, and 100 MB of network bandwidth, the IS function will charge them based on the unit costs of these resources. This charging method has the advantage of encouraging the most efficient use of IS resources, as it provides clear and accurate feedback to the users about their consumption and costs, and motivates them to optimize their usage and avoid waste or overuse. This charging method also aligns the interests of the IS function and the users, as both parties benefit from reducing costs and improving efficiency.
The other possible charging methods are:
Total utilization to achieve full operating capacity: This means that the IS function charges a fixed amount to each user or business unit based on their proportion of the total operating capacity of the IS resources. For example, if a user or business unit has 10% of the total computing power allocated to them, they will pay 10% of the total IS costs. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency. This charging method also creates a mismatch between the interests of the IS function and the users, as the IS function benefits from increasing costs and capacity, while the users bear the burden of paying for them.
Residual income in excess of actual incurred costs: This means that the IS function charges a markup or profit margin on top of its actual incurred costs to each user or business unit.For example, if a user or business unit consumes $100 worth of IS resources, the IS function will charge them $120, where $20 is the residual income for the IS function. This charging method has the disadvantage of discouraging efficient use of IS resources, as it increases the costs for the users and reduces their value for money. This charging method also creates a conflict between the interests of the IS function and the users, as the IS function benefits from increasing costs and profits, while the users suffer from paying more than they should.
Allocations based on the ability to absorb charges: This means that the IS function charges different amounts to different users or business units based on their ability to pay or their profitability. For example, if a user or business unit is more profitable or has a higher budget than another user or business unit, they will pay more for the same amount of IS resources. This charging method has the disadvantage of discouraging efficient use of IS resources, as it does not reflect the actual consumption or usage of each user or business unit, and does not provide any incentive to reduce costs or improve efficiency. This charging method also creates an unfair and arbitrary distribution of costs among the users or business units, as some paymore than others for no valid reason. References: 1: Charging Methods for IT Services - IT Process Wiki 2: IT Chargeback Methods - CIO Wiki 3: IT Chargeback - Wikipedia
CISA-CN Exam Question 39
當網路攻擊發生時,下列哪項安全措施可以降低傳播風險?
Correct Answer: D
Network segmentation is the best security measure to reduce the risk of propagation when a cyberattack occurs, because it divides the network into smaller subnetworks that are isolated from each other and have different access controls and security policies. This limits the spread of malicious traffic and prevents attackers from accessing sensitive data or systems in other segments. A perimeter firewall, a data loss prevention (DLP) system, and a web application firewall are also useful security measures, but they do not prevent propagation within the network as effectively as network segmentation does. References: CISA Review Manual (Digital Version)1, Chapter 5, Section 5.2.3
CISA-CN Exam Question 40
下列哪一項是解決與無意洩漏安全日誌中包含的機器識別碼資訊相關的潛在資料隱私問題的最佳方法?
Correct Answer: A
Limiting the use of logs to only those purposes for which they were collected is the best way to address potential data privacy concerns associated with inadvertent disclosure of machine identifier information contained within security logs, because it minimizes the risk of unauthorized access, misuse, or leakage of personal data that may be embedded in the logs. Logs should be collected and processed in accordance with the data protection principles and regulations, such as theGeneral Data Protection Regulation (GDPR)
12. Restricting the transfer of log files from host machine to online storage, only collecting logs from servers classified as business critical, and limiting log collection toonly periods of increased security activity are not effective ways to address data privacy concerns, because they do not prevent or mitigate the potential disclosure of personal datain the logs. References: 1: CISA Review Manual (DigitalVersion), Chapter 5, Section 5.4.4 2: CISA Online Review Course, Module 5, Lesson 4
12. Restricting the transfer of log files from host machine to online storage, only collecting logs from servers classified as business critical, and limiting log collection toonly periods of increased security activity are not effective ways to address data privacy concerns, because they do not prevent or mitigate the potential disclosure of personal datain the logs. References: 1: CISA Review Manual (DigitalVersion), Chapter 5, Section 5.4.4 2: CISA Online Review Course, Module 5, Lesson 4
- Other Version
- 252ISACA.CISA-CN.v2025-12-17.q626
- Latest Upload
- 109ISACA.CISA-CN.v2025-12-21.q601
- 119Nutanix.NCP-CN.v2025-12-21.q49
- 115Fortinet.FCSS_LED_AR-7.6.v2025-12-21.q42
- 114Cloudera.CDP-3002.v2025-12-21.q157
- 125Microsoft.AZ-400.v2025-12-21.q278
- 152ISACA.CISM.v2025-12-21.q445
- 119CompTIA.DA0-002.v2025-12-21.q55
- 117Peoplecert.ITIL-4-Practitioner-Release-Management.v2025-12-20.q10
- 131Oracle.1z0-1073-25.v2025-12-20.q45
- 145TheOpenGroup.OGEA-101.v2025-12-19.q54
[×]
Download PDF File
Enter your email address to download ISACA.CISA-CN.v2025-12-21.q601 Practice Test
