Recent Posts

6/recent/ticker-posts

“200”, Aptitude Test Questions and Answers for Mkaguzi Daraja la II – Ukaguzi wa Usalama wa Mifumo ya TEHAMA – the National Audit Office (NAOT).

 


“200”, Aptitude Test Questions and Answers for Mkaguzi Daraja la II – Ukaguzi wa Usalama wa Mifumo ya TEHAMA – the National Audit Office (NAOT).

 

 

ABSTRACT

This set of 200 questions assesses knowledge in IT auditing and cybersecurity, covering access control, network and cloud security, data protection, encryption, vulnerability management, incident response, and audit trails. It includes both theoretical and practical questions, testing understanding of risks, security controls, policies, and best practices. Designed for IT auditors, cybersecurity professionals, and students, the compilation emphasizes analytical thinking, decision-making, and application of security principles in organizational environments.

 

Prepared by: Cyber Security Team

Compiled by Johnson Yesaya Mgelwa.

A lawyer stationed in Dar-es-salaam.

0628729934.

Date: June 10, 2025

 

Dear applicants,

This collection of questions and answers has been prepared to help all of you to understand the key areas tested during the interview. The goal is to provide a useful, and practical study guide so you can all perform confidently and fairly in the selection process. I wish you the best of luck, and may this resource support you in achieving success!

 

Warm regards,

Johnson Yesaya Mgelwa

 

For Personal Use by Applicants Preparing for Mkaguzi Daraja la II – Ukaguzi wa Usalama wa Mifumo ya TEHAMA – the National Audit Office (NAOT).


ALL QUESTIONS ARE COMPILED TOGETHER.


1. During an IT audit, which tool would best help identify open ports and potential unauthorized services on a government server?

A. Wireshark B. Nessus C. Nmap D. Snort

Answer: C. Nmap

Rationale: Nmap (Network Mapper) is a network scanning tool used by auditors to discover open ports, running services, and potential vulnerabilities. It helps in identifying unauthorized network exposure, a crucial first step in security assessments.


2. An IS auditor detects that user passwords are stored in plain text within the database. What is the most appropriate recommendation?

A. Use a simple encryption algorithm B. Implement password hashing C. Restrict access to passwords D. Back up passwords regularly

Answer: B. Implement password hashing

Rationale: Password hashing ensures that actual passwords are not stored or retrievable, only their cryptographic representations are. It is stronger than encryption for authentication systems since hashing is one-way and prevents password disclosure even if the database is compromised.


3. Which of the following best describes a firewall’s main function?

A. Encrypting all data leaving the network B. Monitoring server performance C. Controlling inbound and outbound network traffic D. Managing user accounts

Answer: C. Controlling inbound and outbound network traffic

Rationale: A firewall acts as a barrier between trusted and untrusted networks, filtering packets based on defined security rules. It does not manage accounts or perform encryption but ensures traffic complies with organizational access policies.


4. While auditing a system, you find that administrators share one account to manage servers. What is the primary risk?

A. Slow network performance B. Loss of audit trail C. Increased password strength D. Reduced administrative costs

Answer: B. Loss of audit trail

Rationale: Shared accounts prevent traceability, making it impossible to hold specific users accountable for actions. This weakens internal control and undermines forensic or accountability processes during audits.


5. Which tool would be most useful for capturing and analyzing real-time network traffic?

A. Nmap B. Burp Suite C. Metasploit   D. Wireshark

Answer: D. Wireshark

Rationale: Wireshark allows packet-level inspection of network data in real time. It helps auditors identify unauthorized communication, unencrypted transmissions, or suspicious activity, providing evidence during network audits.


6. An auditor is verifying the effectiveness of IDS/IPS systems. What should be the focus of testing?

A. The capability to detect and block malicious traffic   B. The number of users logged in  C. Server uptime D. Log file sizes

Answer: A. The capability to detect and block malicious traffic

Rationale: IDS/IPS systems are intrusion detection and prevention mechanisms. Their effectiveness is measured by their ability to identify and respond to unauthorized activities in the network.


7. What is the main reason for maintaining audit trails in information systems?

A. To improve system performance  B. To store old data for backups C. To track and reconstruct system activities  D. To reduce disk space usage

Answer: C. To track and reconstruct system activities

Rationale: Audit trails provide chronological logs of user and system activities. They are vital for detecting fraud, investigating incidents, and ensuring compliance with accountability requirements.


8. During a security review, an auditor observes that backup tapes are stored in the same building as production servers. What is the key risk?

A. Physical disaster could destroy both backups and originals  B. Unauthorized data deletion C. Slow recovery speed D. Excessive storage cost

Answer: A. Physical disaster could destroy both backups and originals

Rationale: Storing backups in the same location as primary systems exposes them to identical physical threats such as fire or flooding. Off-site or cloud storage mitigates this risk.


9. The best method to ensure data confidentiality during transmission over public networks is:

A. Compression  B. Mirroring C. Auditing D. Encryption

Answer: D. Encryption

Rationale: Encryption converts plaintext into ciphertext, ensuring that intercepted data remains unreadable to unauthorized entities, thereby preserving confidentiality across insecure channels.


10. A vulnerability assessment identifies outdated antivirus software on multiple workstations. What should be the auditor’s immediate recommendation?

A. Disable antivirus B. Update antivirus signatures C. Replace all workstations D. Uninstall unused application

Answer: B. Update antivirus signatures

Rationale: Outdated antivirus software cannot detect new malware variants. Regular updates ensure the system recognizes and mitigates the latest threats, a key control in endpoint protection.


11. The purpose of penetration testing in IT audit is to:

A. Train new IT staff B. Simulate real-world attacks to identify vulnerabilities C. Evaluate physical infrastructure D. Improve user interfaces

Answer: B. Simulate real-world attacks to identify vulnerabilities

Rationale: Penetration testing (ethical hacking) helps assess how systems withstand actual attack scenarios. It identifies weaknesses before malicious actors can exploit them.


12. Which of the following best ensures integrity of system data?

A. Regular data backup B. Encryption C. Hashing and validation controls D. Antivirus updates

Answer: C. Hashing and validation controls

Rationale: Data integrity means accuracy and consistency. Hashing and input validation controls detect unauthorized modifications and prevent data corruption.


13. When conducting an IT audit, segregation of duties primarily prevents:

A. System downtime B. Unauthorized changes or fraud C. Data duplication D. System overload

Answer: B. Unauthorized changes or fraud

Rationale: Segregation of duties ensures that no single individual has control over all critical processes. It reduces risk of intentional manipulation and error by enforcing independent checks.


14. Which is the best method to verify that backups can be successfully restored?

A. Checking the backup log B. Running a test restoration process C. Verifying file timestamps D. Scanning with antivirus

Answer: B. Running a test restoration process

Rationale: Backup integrity can only be confirmed through actual restoration. Logs alone don’t guarantee recoverability, making test restores essential in audit evaluations.


15. The main objective of risk assessment in information systems auditing is to:

A. Eliminate all system risks B. Identify, prioritize, and mitigate potential threats C. Increase system performance D. Comply with HR policies

Answer: B. Identify, prioritize, and mitigate potential threats

Rationale: Risk assessment systematically identifies vulnerabilities and determines their likelihood and impact, allowing prioritization and efficient allocation of controls.


16. In network auditing, which device helps monitor network traffic for suspicious patterns?

A. Firewall B. Router C. Intrusion Detection System D. Switch

Answer: C. Intrusion Detection System

Rationale: IDS continuously monitors network traffic, analyzing it for anomalies or attack signatures. It alerts administrators when unusual behavior is detected, enabling prompt investigation.


17. Which of the following is a primary preventive control?

A. Audit trail B. Firewall C. Incident report D. System log analysis

Answer: B. Firewall

Rationale: Preventive controls stop security incidents before they occur. A firewall filters traffic at the entry point, unlike audit trails or logs which are detective controls.


18. What is the main purpose of encryption standards like AES?

A. To improve data transfer speed B. To compress files C. To protect data confidentiality and integrity D. To remove malware

Answer: C. To protect data confidentiality and integrity

Rationale: AES (Advanced Encryption Standard) secures data by making it unreadable to unauthorized users and ensures that tampering is detectable, preserving integrity and confidentiality.


19. Which of the following would best detect unauthorized data modification?

A. Audit trail review B. Antivirus software C. Firewall D. Data compression

Answer: A. Audit trail review

Rationale: Reviewing audit trails allows detection of abnormal transactions or changes, revealing unauthorized activities that might compromise data integrity.


20. An auditor finds that system administrators can modify their own access logs. What control weakness does this indicate?

A. Lack of input validation B. Inadequate segregation of duties C. Weak password policy D. Insufficient hardware

Answer: B. Inadequate segregation of duties

Rationale: Allowing administrators to alter their logs compromises accountability and hides traces of unauthorized actions. Duties related to log management should be separated from system administration.


21. The most effective way to ensure continuous system availability is through:

A. RAID storage and redundant systems B. Antivirus installation C. Encryption of all files D. Network monitoring

Answer: A. RAID storage and redundant systems

Rationale: Redundancy ensures service continuity even when hardware fails. RAID storage combines drives for fault tolerance, a crucial control for maintaining uptime.


22. A system uses multi-factor authentication (MFA). What is its main advantage?

A. Reduces bandwidth usage B. Strengthens user verification by combining multiple credentials C. Simplifies password management D. Hides user identity

Answer: B. Strengthens user verification by combining multiple credentials

Rationale: MFA requires two or more verification factors (e.g., password + OTP). It significantly reduces unauthorized access risk even if one factor is compromised.


23. Which type of control ensures data can be recovered after system failure?

A. Detective control B. Preventive control C. Corrective control D. Compensating control

Answer: C. Corrective control

Rationale: Corrective controls, like backups and disaster recovery procedures, restore normal operations after incidents. They address the impact rather than preventing the cause.


24. An auditor wants to assess whether data transmissions between branches are secure. Which test should be performed?

A. Packet capture and analysis B. Password strength test C. Database indexing D. Load balancing test

Answer: A. Packet capture and analysis

Rationale: Capturing and analyzing packets using tools like Wireshark reveals whether data is transmitted in encrypted or plain text form, verifying communication security.


25. During an audit, it is discovered that terminated employees still have active system accounts. What risk does this pose?

A. Increased storage cost B. Unauthorized access to systems C. Slower login process D. Poor user training

Answer: B. Unauthorized access to systems

Rationale: Failure to promptly disable inactive or terminated users’ accounts exposes systems to insider threats and breaches, undermining access control effectiveness.


26. An auditor discovers that system updates are done manually and irregularly. What is the primary risk?

A. System instability B. Unauthorized access C. Exposure to known vulnerabilities D. Poor user experience

Answer: C. Exposure to known vulnerabilities

Rationale: Irregular updates mean the system misses critical security patches, leaving it exposed to threats already fixed by vendors. Automated updates help close known security holes promptly.


27. When performing a wireless network audit, what finding would most likely indicate a security weakness?

A. WPA3 encryption B. Hidden SSID C. Open network without encryption D. Use of MAC address filtering

Answer: C. Open network without encryption

Rationale: An open Wi-Fi network allows anyone to connect and intercept communications. Encryption (like WPA3) is critical to ensure data confidentiality in wireless environments.


28. Which of the following best describes the function of an intrusion prevention system (IPS)?

A. Detects and logs network intrusions B. Identifies and blocks malicious traffic in real time C. Analyzes audit trails D. Filters spam emails

Answer: B. Identifies and blocks malicious traffic in real time

Rationale: Unlike IDS, which only detects, an IPS actively blocks attacks as they occur by inspecting traffic and enforcing policies to stop harmful activity.


29. An IT auditor finds that access logs are overwritten every 24 hours. What control weakness does this indicate?

A. Excessive logging B. Insufficient log retention C. Strong log encryption D. Proper log rotation

Answer: B. Insufficient log retention

Rationale: Logs are essential for investigations and trend analysis. Overwriting them too soon erases evidence and violates good audit trail management practices.


30. During a vulnerability scan, which result should concern the auditor most?

A. Outdated printer drivers B. Unpatched operating systems C. Multiple user logins D. Frequent log rotations

Answer: B. Unpatched operating systems

Rationale: Unpatched systems are high-risk vulnerabilities because attackers can exploit known flaws easily. It represents an immediate threat to data and system integrity.


📘 Get the Full Aptitude Test Questions PDF through your  Gmail (Questions 1–200)

You’ve just accessed the first 30 questions. The full set of 200 expertly prepared Aptitude Test questions for Mkaguzi Daraja la II – Ukaguzi wa Usalama wa Mifumo ya TEHAMA at – the National Audit Office (NAOT). Is available, pay, and get access.

To get access to the full PDF, please make a payment of Tsh 10,000 to the LIPA numbers below:

Airtel Money LIPA Number: 13970429
Yas/Tigo LIPA Number: 18401500
M-Pesa WAKALA:  826910
Selcom Lipa Number: 61122934
Registered Name: Johnson Yesaya Mgelwa

After payment, please send a text message to notify us of your payment:

Contact Number: +255 628 729 934

⚠️ Important Notice

  • The PDF will be watermarked with your name and phone number and protected for personal use only.
  • Redistribution, sharing, screenshotting, or copying the contents is strictly prohibited. When you share unlawfully, your name and phone number are visible and easy to trace as you leaked a document to other third parties.
  • Legal action may be taken against the misuse of this material.

Thank you for supporting quality content. Best of luck in your interview preparation!

Post a Comment

0 Comments