CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 369


Which of the following is MOST important for an IS auditor to verify when evaluating an organization's firewall?

Show Answer
Correct Answer: B

Access to configuration files is restricted is the most important aspect for an IS auditor to verify when evaluating an organization's firewall. Unauthorized access to these files can lead to misconfigurations or intentional changes by malicious actors, which can compromise the firewall’s effectiveness and expose the network to security threats. Maintaining the integrity and security of configuration files is critical to ensure the firewall operates as intended and protects the organizational network.

Discussion

5 comments
Sign in to comment
ChangwhaOption: B
Jul 16, 2023

B. Access to configuration files is restricted.

SwallowsOption: B
Jun 8, 2024

Access to configuration files being restricted is critical for maintaining the security and integrity of the firewall configuration. Unauthorized access to firewall configuration files could lead to misconfigurations, vulnerabilities, or intentional changes by malicious actors, compromising the effectiveness of the firewall and potentially exposing the organization's network to security risks.

kGiGaOption: A
Nov 27, 2023

The most important thing for an IS auditor to verify when evaluating an organization’s firewall is that the logs are being collected in a separate protected host. Logs are records of events or activities that occur on a system or network, such as connections, requests, responses, errors, and alerts. Logs can provide valuable information for auditing, monitoring, troubleshooting, and investigating security incidents. However, logs can also be tampered with, deleted, or corrupted by attackers or insiders who want to hide their tracks or evidence of their actions. Therefore, it is essential that logs are stored in a separate host that is isolated and secured from the network and the firewall itself, to prevent unauthorized access or modification of the logs.

cidigi
Dec 23, 2023

Log collection itslelf means nothing.. Someone needs to review, someone needs to act. Access to conf files is more important, you can change settings, how fw operates, to which syslog the logs are sent to etc.

topikalOption: B
Jun 19, 2024

its more dangerous to be able to tamper with configuration files than logs. answer is B

RS66Option: B
Jul 3, 2024

A is important but B is MOST important. So I say B