版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
2025年国际注册信息系统审计师(CISA)资格考试(英文版)综合能力测试题及答案PartI–Multiple-Choice(SelecttheBESTanswer;1markeach)1.Duringapost-implementationreviewofanERPpayrollmodule,anISauditornotesthattheovertimecalculationrulewaschangedthreeweeksaftergo-livewithoutdocumentation.WhichfindingisMOSTconcerning?A.Thechangewasnottestedinthequalityassuranceenvironment.B.ThechangewasapprovedbytheHRdirectorinsteadoftheprocessowner.C.Thechangewasmigratedthroughtheemergencychangeprocedure.D.Thechangeproduceda0.8%varianceinthemonthlysalaryaccrual.Answer:AExplanation:EmergencychangesstillrequireQAtestingcommensuratewithrisk.Theabsenceofanytestingexposestheorganisationtomaterialmisstatementinpayrollandpossibleregulatorynon-compliance.Theotherchoicesaresecondary:approvalbyHRdirector(B)isweakgovernancebutnotnecessarilyineffective;emergencyprocedure(C)ispermissibleifjustified;0.8%variance(D)isimmaterialinmostjurisdictions.2.Anorganisationusesacloud-hosteddatalakeencryptedwithAES-256.TheCISOstatesthat“encryptionatresteliminatestheneedfortokenisation.”TheISauditorshouldrespondthat:A.TokenisationisredundantwhenAES-256isimplemented.B.Tokenisationaddressesdataresidencyrequirementsencryptioncannot.C.Tokenisationreduceskey-managementcomplexity.D.Tokenisationisonlyrelevantforstructuredrelationaldata.Answer:BExplanation:Tokenisationsubstitutessensitivedataelementswithnon-exploitableequivalents,enablingworkloadstoresideinjurisdictionswithstrictdata-sovereigntyrules.Encryptionatrestdoesnotchangethephysicallocationorlegalclassificationofdata.3.WhichofthefollowingBESTdemonstratesthatavulnerabilitymanagementprogrammeisrisk-basedratherthancompliance-driven?A.ScanfrequencyexceedsPCIDSSminimumrequirements.B.PatchesareprioritisedbyCVSSscoreweightedagainstassetcriticality.C.ThepatchSLAisdocumentedintheInformationSecurityPolicy.D.Unpatchedsystemsarereportedtoseniormanagementquarterly.Answer:BExplanation:WeightingCVSSagainstassetcriticalityalignsremediationeffortwithprobablebusinessimpact,ahallmarkofrisk-basedprogrammes.ExceedingPCIfrequency(A)maystillbechecklist-driven;documentingSLAs(C)andreporting(D)aregovernanceartefacts,notevidenceofriskorientation.4.Afintechstart-upimplementsablockchainconsensusmechanismthatrequiresonly30%ofnodestoagreetovalidateatransaction.FromanISauditor’sperspective,thePRIMARYriskis:A.Forkingofthechain.B.51%attack.C.Doublespending.D.Collusionamongminoritynodes.Answer:DExplanation:A30%thresholdlowersthebarriertocollusion;maliciousactorscontrollingone-thirdofnodescanrewriterecenthistory.A51%attack(B)isimpossiblebydefinitionat30%,butminoritycollusion(D)issufficienttocompromiseintegrity.5.AnISauditorreviewingSOC2TypeIIreportsforaSaaSvendornotesthatthe“logicalaccess”controlexceptionrateincreasedfrom2%to12%year-over-year.TheFIRSTstepisto:A.Recommendcontracttermination.B.Validatewhetherthepopulationsizechanged.C.Requestacompensatingcontrolmatrix.D.Escalatetotheboardauditcommittee.Answer:BExplanation:Anapparentincreasemaybeastatisticalartefactifthesampleorpopulationexpanded.Understandingdenominatorchangesisessentialbeforeconcludingoncontroleffectiveness.6.WhichcontrolBESTmitigatestheriskof“deepfake”voicefraudinthecallcentre?A.CallbacktothenumberregisteredintheCRM.B.Voicebiometricauthentication.C.Knowledge-basedauthentication(KBA).D.Randomisedsecurityquestions.Answer:AExplanation:DeepfakeaudiodefeatsbiometricandKBAcontrols.Out-of-bandverificationusingapre-registeredcallbacknumberprovidesaseparatechannelresistanttosyntheticmedia.7.Duringapenetrationtest,theauditorobtainsareverseshellbyexploitinganunpatchedprintserver.TheprintserverissegmentedbyaVLANwithACLsdenyingany-to-anytraffic.WhichfindingshouldbereportedFIRST?A.TheVLANsegmentationisineffective.B.TheACLsaremisconfigured.C.Theprintserverlackshost-basedfirewallrules.D.Thepatchingprocessisimmature.Answer:DExplanation:Rootcauseistheunpatchedvulnerability;segmentation(A,B)andhostfirewall(C)arelayereddefencesbutdonotexcusetheabsenceoftimelypatching.8.Anorganisationadoptsa“zero-trust”networkarchitecture.WhichmetricBESTdemonstratesprogrammematurity?A.Percentageofuserswithmulti-factorauthentication(MFA).B.Meantimetodetect(MTTD)lateralmovement.C.Numberoffirewallrulesets.D.Ratioofencryptedvs.unencryptedeast-westtraffic.Answer:BExplanation:Zero-trustaimstominimiseimplicittrustzones.Detectinglateralmovementquicklyvalidatesthatmicro-segmentationandbehaviouralanalyticsarefunctioning.9.Adata-centre’sUPSsystemshows98%availabilityoverthelastyear,versustheSLAof99.9%.TheISauditorshould:A.ConcludethattheSLAistoostringent.B.Reviewthepreventivemaintenancelogs.C.RecommendredundantUPSunits.D.Recalculateavailabilityexcludingplannedmaintenancewindows.Answer:BExplanation:Maintenancelogsrevealwhetherdowntimewasscheduledorduetofailure;thisinformsrootcauseandappropriateremediation.Recalculating(D)maymaskoperationalissues.10.AnewAI-basedintrusiondetectionsystem(IDS)produces400alertsperday,with380beingfalsepositives.TheFIRSTgovernanceactionisto:A.Retrainthemodelwithaugmenteddata.B.AdjusttheBayesianthresholdtoreducesensitivity.C.Definealert-to-ticketconversionrules.D.Validatethebaselinelabellingquality.Answer:DExplanation:Garbage-in-garbage-out:iftraininglabelsareinaccurate,retraining(A)orthresholdtuning(B)willnothelp.Establishinglabelintegrityprecedesmodeladjustments.11.WhichofthefollowingistheMOSTreliableevidencethataransomwareincidentresponseplaniseffective?A.Theplanisupdatedannually.B.Table-topexercisesincludeexecutiveparticipation.C.Recoverytimeobjective(RTO)wasmetduringthelastrealincident.D.TheplanalignswithNISTSP800-61r2.Answer:CExplanation:ActualperformanceagainstRTOprovidesempiricalevidence;alignment(D)andexercises(B)arepreparatory,whileannualupdates(A)areadministrative.12.AnISauditorreviewingcontainersecurityfindsthattheDevOpspipelinescansimagesforCVEsonlyatbuildtime.TheGREATESTriskis:A.ImagesmaydriftasnewCVEsarepublished.B.Thescanslowspipelinevelocity.C.BaseimagesarepulledfromDockerHub.D.Secretscouldbeembeddedinlayers.Answer:AExplanation:Vulnerabilitydatabasesevolvedaily;aone-timescancannotdetectnewlydisclosedCVEsinalready-deployedimages.Runtimeorregistryre-scanningisessential.13.Acompany’sBring-Your-Own-Device(BYOD)policyrequiresemployeestobackuppersonaldevicestothecorporatecloud.ThePRIMARYprivacyconcernis:A.Comminglingofcorporateandpersonaldata.B.Increasedbandwidthusage.C.Inabilitytoenforcegeolocationwiping.D.Potentialformalwareupload.Answer:AExplanation:Comminglingcomplicatesdata-classification,e-discovery,andsubject-accessrequests,creatingregulatoryexposure.Malware(D)isasecurityissue,notprivacy.14.WhichcontrolBESTensurestheintegrityofaroboticprocessautomation(RPA)botthatupdatescustomercreditlimits?A.Codesigningofbotscripts.B.Immutableauditlogofbotdecisions.C.Dual-authorityforlimitchanges.D.Hashtotalsreconciledpre-andpost-run.Answer:DExplanation:Hashtotals(e.g.,sumofcreditlimits)detectunauthorisedrecordmodifications,directlyvalidatingintegrity.Auditlogs(B)aredetectivebutnotpreventive.15.AnISauditorisaskedtoassesstheriskofquantumcomputingoncurrentcryptography.TheFIRSTstepisto:A.Inventorydataclassifiedasconfidentialwithretention>10years.B.Recommendadoptionoflattice-basedalgorithms.C.Performaquantumthreatmaturityassessment.D.Engageaquantum-safevendor.Answer:AExplanation:A10-yearinventoryidentifiesassetssusceptibleto“harvest-now-decrypt-later”attacks,prioritisingmigrationurgency.Vendorengagement(D)isprematurewithoutscoping.16.Duringanagilesprintretrospective,theproductownerrefusestologfindingsintheissuetracker,claiming“retrospectivesareinformal.”TheISauditorshould:A.EscalatetotheScrumMaster.B.Documentthelackofaudittrail.C.Concludethatagileisincompatiblewithgovernance.D.Recommendrevertingtowaterfall.Answer:BExplanation:Governancerequiresevidence;absenceofdocumentationimpedesfutureauditsandcontinuousimprovement.Escalation(A)issecondarytorecordingthegap.17.AbankusesanAImodelforcreditscoring.Themodel’sfalse-negativerateincreasedfrom3%to7%afteradatadrift.WhichcontrolisMOSTeffectivetopreventinadvertentdiscrimination?A.Fairnessconstraintbakedintothelossfunction.B.Monthlydisparate-impacttesting.C.Explainabilitydashboardforloanofficers.D.Outcome-trackingbydemographicgroup.Answer:AExplanation:Embeddingfairnessconstraintsduringtraining(e.g.,equalisedodds)proactivelylimitsdiscriminatoryimpact.Post-hoctesting(B,D)isdetective;dashboards(C)areinformative.18.ASOCanalystdisablesasignaturetostopfalse-positivealerts,buttheactionisnotlogged.TheISauditor’sPRIMARYconcernis:A.Alertfatigue.B.Lackofchangeauthorisation.C.Potentialundetectedintrusions.D.Absenceoflogging.Answer:CExplanation:Disablingasignaturemayallowrealintrusionstopassunnoticed,creatingacontrolgap.Whilelogging(D)andauthorisation(B)areweak,theultimateriskismisseddetection.19.WhichtestBESTconfirmsthatdatabaseencryptionkeysareproperlysegregatedfromthedatatheyprotect?A.ReviewHSMauditlogsforkeyusage.B.Verifykeyrotationfrequency.C.ConfirmseparationofdutiesbetweenDBAsandsecurityofficers.D.Validatethatkeysarenotexportedtothesamevolumegroup.Answer:DExplanation:Physicalorlogicalseparationofkeysandciphertextisfundamental.Exporttothesamevolume(D)negatessegregation,whereasusagelogs(A)androtation(B)areancillary.20.Anorganisation’sincidentresponseteamusesasharedGmailaccountforcoordination.TheGREATESTriskis:A.Lackofencryption.B.Nodata-lossprevention(DLP).C.Absenceofmulti-factorauthentication.D.Potentialaccountlockoutduetopasswordreuse.Answer:CExplanation:SharedcredentialsprecludeMFA,exposingthemailboxtotakeoverandlossofforensicevidence.DLP(B)andencryption(A)aresecondarytoauthentication.21.AmanufacturerdeploysIndustrialInternetofThings(IIoT)sensorsontheshopfloor.TheISauditornotesthatfirmwareupdatesarepushedviaunencryptedHTTP.TheBESTrecommendationisto:A.SegmenttheOTnetwork.B.Implementcodesigning.C.UseencryptedOTAchannels.D.DisableunusedUARTports.Answer:CExplanation:Encryptingover-the-air(OTA)updatespreventsman-in-the-middleinjectionofmaliciousfirmware.Segmentation(A)limitsblastradiusbutdoesnotsecuretheupdateitself.22.Acompany’sprivacynoticestatesitwill“retainpersonaldatanolongerthannecessary.”Toprovideauditassurance,theISauditorshould:A.InterviewtheDPO.B.Inspectdata-deletionschedulesandevidence.C.Reviewtheretentionclauseintheemployeehandbook.D.Confirmbackup-tapeencryption.Answer:BExplanation:Deletionschedulesandlogsfurnishobjectiveevidenceofcompliancewiththestatedprinciple.Interviews(A)arecorroborativebutnotsufficient.23.WhichofthefollowingistheMOSTmeaningfulindicatorthatsecurityawarenesstrainingreducesphishingsusceptibility?A.95%ofstaffcompletedtraining.B.Phish-pronepercentagedroppedfrom18%to4%.C.Trainingcontentwasupdatedwithnewtemplates.D.Averagetrainingtimeincreasedto45minutes.Answer:BExplanation:Behaviouraloutcome(reducedclickrate)directlymeasureseffectiveness.Completionrate(A)andduration(D)areinputmetrics.24.AnISauditorreviewingopen-sourcesoftware(OSS)governancefindsthatdevelopersareallowedtodownloadanylibraryfromMavenCentral.ThePRIMARYcontrolgapis:A.Licensecompliance.B.Typosquattingrisk.C.Lackofchecksumverification.D.Dependencyconfusionattack.Answer:DExplanation:Withoutinternalnamespacereservation,attackerscanpublishhigher-versionmaliciouspackagesthatdependencymanagerspreferentiallyfetch.License(A)andchecksums(C)aresecondary.25.Acitygovernmentstorescitizenvideoevidenceinapubliccloudobjectstore.WhichcontrolBESTensuresnon-repudiation?A.SSE-S3encryption.B.Write-Once-Read-Many(WORM)retention.C.SignedURLswithexpiry.D.CloudTrailobject-levellogging.Answer:BExplanation:WORM(e.g.,S3ObjectLockincompliancemode)preventsalterationordeletionbeforeretentionexpiry,supportingnon-repudiation.Logging(D)isdetective;encryption(A)protectsconfidentiality.PartII–Multiple-Response(SelectTWOcorrectanswers;2markseach)26.WhichTWOcontrolsMOSTeffectivelyreducetheriskoffraudulentACHtransfersinitiatedviacompromisedbankingcredentials?A.IP-whitelistingforcorporatenetbanking.B.Out-of-bandtransactionsigningusingamobileapp.C.Dailyreconciliationbytreasury.D.Machine-learninganomalydetectionontransferamounts.E.HardwaretokenOTPatlogin.Answers:B,DExplanation:Out-of-bandsigning(B)preventsunauthorisedpaymentfilesevenifcredentialsarephished.MLanomalydetection(D)flagssuspiciouspatternsinrealtime.IP-whitelisting(A)isbrittleforremotework;reconciliation(C)isdetectivepost-factum;OTP(E)protectsloginbutnotsessionhijacks.27.AnorganisationismigratingSAPtoAWS.WhichTWOdesignchoicesBESTsupportevidencepreservationforfutureforensicinvestigations?A.EnableVPCTrafficMirroringtoadedicatedforensicVPC.B.StoreOS-levellogsinCloudWatchwith365-dayretention.C.Useinstancestorefor/var/logtoreduceEBScost.D.ActivateAWSConfigwithrecordingofallresourcechanges.E.DisableSELinuxtoimprovecompatibility.Answers:A,DExplanation:TrafficMirroring(A)capturesfullpacketdata;Config(D)recordsAPI-levelchanges.CloudWatch(B)lacksfullpacketcaptureand365-dayretentionisexpensive.Instancestore(C)isephemeral;disablingSELinux(E)weakenssecurity.28.Ahealth-techstart-upprocessesgeneticdata.WhichTWOcontractualclausesareMOSTcriticalwhenoutsourcinganalyticstoathird-partyAIplatform?A.Righttoauditsub-processors.B.DataportabilityinCSVformat.C.GDPRArticle28processoragreement.D.IndemnityforIPinfringementbytheAImodel.E.Waiverofrighttoerasureforresearchexemption.Answers:A,CExplanation:Righttoaudit(A)ensurestransparencyoversub-processors;Art.28(C)mandatessecurityandconfidentialityprovisions.Dataportability(B)isuser-centric,notcoretooutsourcingrisk;IPindemnity(D)issecondary;waiver(E)isgenerallyunenforceableagainstdata-subjectrights.29.Azero-trustarchitectureprojectrequiresendpointpostureassessment.WhichTWOattributesMOSTreliablyindicateacompromiseddevice?A.Certificateexpirywithin30days.B.Presenceofunsignedkerneldrivers.C.MDM-reportedrooted/jailbrokenflag.D.Geo-locationmismatchfromHQ.E.CPUutilisation>90%.Answers:B,CExplanation:Unsigneddrivers(B)androotedflag(C)arestrongindicatorsofdeviceintegrityloss.Certificateexpiry(A)isadministrative;geo-mismatch(D)maybelegitimatetravel;highCPU(E)isambiguous.30.AretailerdeploysRFIDtagsforinventory.WhichTWOcontrolsBESTprotectcustomerprivacyintheeventoftagdataleakage?A.Killcommandafterpoint-of-sale.B.PseudonymousEPCcodes.C.256-bitAESencryptionontag.D.Faraday-cageshoppingbags.E.Rotatingtagpasswords.Answers:A,BExplanation:Killcommand(A)preventstrackingpost-sale;pseudonymousEPCs(B)avoidlinkingtopersonaldata.AES(C)isofteninfeasibleonpassivetags;Faradaybags(D)areuser-dependent;passwordrotation(E)doesnotremovedata.PartIII–Scenario-BasedShortAnswer(5markseach)31.ScenarioAmultinationalbankoperatesalegacymainframeforcorebankinginterfacedwithamodernAPIgateway.DuringaCOBIT-basedaudit,managementassertsthat“mainframeriskislowbecauseitisnotinternet-facing.”Theauditordiscoversthat:•TheAPIgatewayacceptsSOAPrequestsoverHTTPSandtranslatesthemintonativemainframetransactions.•Thegatewaystoresmainframecredentialsinacleartextconfigurationfile.•Mainframepasswordrulesallow6-characteralphabeticstrings.•NomainframeauditlogsareforwardedtotheSIEM.Requireda.IdentifyTHREEsignificantriskimplications.b.ProvideTWOpracticalremediationstepsforeachrisk.Answera.Riskimplications1.Credentialtheftviagatewaycompromiseleadstounrestrictedmainframeaccess.2.Weakpasswordsfacilitatebrute-forceattacksoncethegatewayisbypassed.3.LackofSIEMvisibilitydelaysdetectionofmaliciousmainframeactivity.b.Remediation1.EncryptgatewaycredentialsusinganHSM-backedvault;enforceannualrotationandrestrictsourceIPsviamTLS.2.Implement12-charactercomplexpasswordsandmainframe-basedMFA(e.g.,RACFPassTicket);deploybrute-forcemonitoring.3.EnableSMFlogforwardingthroughasecuresyslogproxy;parsetransactionsinrealtimeforanomalouspatterns(e.g.,high-valuebatchjobsoutsidemaintenancewindows).32.ScenarioAcity’ssmart-metroprojectusesIoTsensorstoadjusttrainfrequency.ThecontrolcentrereceivesdataviaMQTToverpublic4G.Anattackerpublishesspoofed“crowddensity”messages,causingtrainstoskipstations.Requireda.StateTWOcontrolfailuresthatallowedtheattack.b.Recommendadefence-in-depthstrategywithTHREElayers.Answera.Controlfailures1.NoMQTTbrokerauthentication(anonymouspublish).2.Lackofpayloadintegritychecks(nodigitalsignatureorTLSclientcerts).b.Defence-in-depth1.MutualTLSwithclientcertificatesissuedbyaprivateCA;brokerACLsrestrictpublishrightstosensorserialnumbers.2.JSONWebTokenssignedbysensors’secureelement,verifiedatthebrokerandagainattheSCADAapplication.3.Anomalydetectiononthecontrol-centresidecomparingsensordatawithhistoricalCCTVfootfallandticket-gatecounts;automaticfailovertotimetablemodeifvariance>15%.PartIV–CaseStudy(15marks)33.CaseFinCloudLtd.,afast-growingfintech,offersamicro-loanappprocessing50kapplicationsdaily.Thearchitectureisserverless:•Front-end:ReactNativemobileapp.•API:AWSAPIGateway→AWSLambda(Python)→DynamoDB.•Creditdecision:Lambdacallsathird-partyMLscorecardviaREST.•Storage:DynamoDBencryptedwithAWS-ownedkeys;S3bucketforselfiephotosencryptedwithSSE-S3.•CI/CD:GitHubActionsbuildsanddeploysviaTerraform;nomanualapprovals.•Monitoring:CloudWatchlogsretained30days.AuditfindingsexcerptF1.TheTerraformstatefileisstoredinanS3bucketwithversioningbutnoMFAdeleteandpubliclylistable.F2.LambdafunctionsrunwithfullAWS-managedPowerUseraccess.F3.TheMLscorecardproviderretainsapplicantdatafor“modelimprovement”withvagueconsentlanguage.F4.CloudWatchlogsarenotanalysed;alertsarebasedon5xxerrorspikesonly.F5.Pen-testingrevealedanIDORvulnerabilityallowingoneusertoretrieveanother’sloanstatusbyincrementingapplication_id.Tasksa.Foreachfinding,classifytherisktype(confidentiality,integrity,availability,privacy,compliance)andjustifyinonesentence.(5marks)b.Provideadetailedremediationroadmap,includingspecificAWSservicesoropen-sourcetools,timelines,andsuccessmetrics.(10marks)Answera.RiskclassificationF1:Confidentiality—publicS3listingexposesTerraformkeysandinfrastructuredesign.F2:Integrity—over-permissiveLambdarolesallowtamperingwithDynamoDBorS3objects.F3:Privacy—unclearconsentviolatesGDPRpurposelimitationand
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026江苏南京林业大学教学科研岗招聘211人备考题库含答案详解(预热题)
- 2026年甘肃省酒泉市博物馆招聘工作人员备考题库及答案详解(真题汇编)
- 2026重庆九洲隆瓴科技有限公司招聘助理项目经理1人备考题库及答案详解(典优)
- 2026广东广州南沙人力资源发展有限公司现向社会招聘编外人员备考题库含答案详解(b卷)
- 2026内蒙古呼和浩特市实验幼儿园招聘教师1人备考题库及答案详解1套
- 2026年甘肃省兰州大学动物医学与生物安全学院聘用制B岗招聘备考题库带答案详解ab卷
- 2026四川省八一康复中心招聘工作人员(编制外)7人备考题库含答案详解(轻巧夺冠)
- 2026天津联通派遣制智家工程师、营业员招聘5人备考题库及参考答案详解(完整版)
- 2026贵州铜仁市第一批市本级城镇公益性岗位招聘26人备考题库及参考答案详解(黄金题型)
- 2026四川 巴中市属国企市场化招聘聘职业经理人5人备考题库及完整答案详解1套
- 文言文阅读训练:秦灭六国(附答案解析与译文)
- 小学生道德与法治评价方案+评价表
- 2019年湖南省长沙市中考历史试题及答案
- 天津机电职业技术学院教师招聘考试历年真题
- 林教头风雪山神庙 全国优质课一等奖
- 湘版(2017秋)4年级下册实验报告单
- 内部审计如何为管理者服务(一)
- 领导干部的法治思维与法治方式
- 七年级劳动技术-变废为宝课件
- 《纸的发明》优秀课件4
- 组合与组合数课件
评论
0/150
提交评论