CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 491


When evaluating the design of controls related to network monitoring, which of the following is MOST important for an IS auditor to review?

Show Answer
Correct Answer: D

When evaluating the design of controls related to network monitoring, it’s essential to assess how effectively incidents are detected and managed. Incident monitoring logs provide direct insight into how well the network monitoring controls are functioning by showing detected incidents, the system's response, and the timeliness of these actions. These logs enable an auditor to evaluate real-world performance and adequacy of the monitoring controls.

Discussion

7 comments
Sign in to comment
SuperMaxOption: A
Sep 20, 2023

A. Network Topology Diagrams The first step in assessing network monitoring controls should be the review of the adequacy of network documentation, specifically topology diagrams. If this information is not up to date, then monitoring processes and the ability to diagnose problems will not be effective.

[Removed]Option: A
Aug 22, 2023

A. Network Topology Diagrams

oldmagicOption: B
Jun 28, 2023

B is the correct answer here

cidigi
Aug 7, 2023

D. Traffic itself might nothing.

IdkanythingOption: A
Nov 22, 2023

A. Network topology diagrams The first step in assessing network monitoring controls should be the review of the adequacy of network documentation, specifically topology diagrams. If this information is not up to date, then monitoring processes and the ability to diagnose problems will not be effective.

SibsankarOption: D
Mar 12, 2024

Incident monitoring logs offer a direct window into the design and effectiveness of network monitoring controls. They reveal how the system is configured to detect and record security incidents on the network. D. Incident monitoring logs

MJORGEROption: D
Apr 11, 2024

These logs can reveal whether incidents are being detected and responded to in a timely and effective manner.

SwallowsOption: A
Jun 9, 2024

While incident monitoring logs (option D) are important for reviewing actual monitoring activities and detecting security incidents, they provide specific data points rather than a holistic view of the network infrastructure. Network topology diagrams offer a foundational understanding of the network environment, which is essential for evaluating the effectiveness of network monitoring controls. Therefore, they are typically the MOST important aspect for an IS auditor to review when evaluating the design of controls related to network monitoring.