exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 71 discussion

Actual exam question from Isaca's CISA
Question #: 71
Topic #: 1
[All CISA Questions]

When auditing the security architecture of an online application, an IS auditor should FIRST review the:

  • A. location of the firewall within the network.
  • B. firewall standards.
  • C. firmware version of the firewall.
  • D. configuration of the firewall.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 2 years, 2 months ago
I am really blown away by everybody saying it is A. The config will tell you where and what the firewall does. Location of firewall means absolutely nothing. Physical location? I mean a firewall ALWAYS sits in front of your business network...
upvoted 9 times
kGiGa
1 year, 8 months ago
A firewall should protect the application against attacks from the Internet and also from the untrusted users inside the corporate network (internal hackers). Firewalls may be implemented using hardware or software platforms. The location, firewall type, and configuration is important.
upvoted 3 times
...
...
cisastudy567
Most Recent 1 month, 3 weeks ago
Selected Answer: A
The security architecture of an online application is a design that describes how various security components and controls are integrated and configured to protect the application from internal and external threats. When auditing the security architecture of an online application, an IS auditor should first review the location of the firewall within the network, as this determines how effectively the firewall can filter and monitor the traffic between different network segments and zones.
upvoted 1 times
...
PurpleParrot
7 months, 1 week ago
Selected Answer: A
option A network topology is the first thing for the is auditor to review
upvoted 2 times
...
NoKev
8 months, 3 weeks ago
Selected Answer: B
I think the answer is B. Most important is configuration (D), but the very first thing IS auditor reviews must be standards (B).
upvoted 2 times
...
RS66
10 months, 1 week ago
Selected Answer: A
I say A, by location they don't mean physical location. The FW should be placed the between public interface and private network. Location is key.
upvoted 2 times
...
shalota2
10 months, 3 weeks ago
What is the purpose of reviewing configuration first when the firewall have been placed at the worng place? Of course when you audit a network security first thing you say to the the client you ask for the network topology to understand the how the devices are set up. When it comes to the MOST important I agree should be D.
upvoted 1 times
...
Swallows
11 months ago
Selected Answer: B
ChatGPT Reviewing firewall standards (option B) is indeed an important aspect of auditing the security architecture of an online application. Firewall standards provide guidelines and best practices for configuring, managing, and monitoring firewalls, which are critical components of network security. By reviewing firewall standards first, an IS auditor can establish a baseline understanding of the organization's firewall requirements and expectations.
upvoted 1 times
...
a84n
1 year ago
Selected Answer: D
Answer: D
upvoted 1 times
...
5b56aae
1 year ago
Selected Answer: A
location comes first
upvoted 1 times
...
dan08
1 year, 2 months ago
Selected Answer: B
When auditing the security architecture of an online application, the FIRST step for an IS auditor should be to review the firewall standards. These standards define the rules, policies, and configurations governing the firewall’s operation. By assessing compliance with established standards, the auditor can gain insights into the effectiveness of the firewall’s design and implementation.
upvoted 3 times
...
Rachy
1 year, 3 months ago
Selected Answer: B
Firewall Standard
upvoted 2 times
...
001Yogesh
1 year, 4 months ago
Selected Answer: B
It should be B
upvoted 3 times
...
001Yogesh
1 year, 4 months ago
Surprise to see nobody talking about Firewall standard....I think it should be B. Based on standard only we can validate the configuration etc...
upvoted 1 times
...
007Georgeo
2 years ago
Selected Answer: D
the key is online application
upvoted 3 times
...
MohamedAbdelaal
2 years ago
Selected Answer: D
First, you need to review the firewall configuration, then you will have to determine whether this configuration is suitable to where the firewall was placed or not.
upvoted 2 times
...
MichaelHoang
2 years, 3 months ago
Selected Answer: A
whatever reviewing that you are doing, it is useless if you dont know what should be taken care by that device. It is very important to understand the location, the deployment and the protection that device is taking care for the organization. Hence, location of firewall must be identified first before anything else.
upvoted 3 times
...
David_Hu
2 years, 4 months ago
Selected Answer: A
SUPPORT A
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago