Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 119

Mary Smith

Sat, 24 May 2025

CISA—Certified Information Systems Auditor - Part 119

1. Which of the following statement correctly describes one way SSL authentication between a client (e.g. browser) and a server (e.g. web server)?

A) Only the server is authenticated while client remains unauthenticated
B) Only the client is authenticated while server remains authenticated
C) Client and server are authenticated
D) Client and server are unauthenticated



2. Which of the following statement correctly describes difference between SSL and S/HTTP?

A) Both works at application layer of OSI model
B) SSL works at transport layer where as S/HTTP works at application layer of OSI model
C) Both works at transport layer
D) S/HTTP works at transport layer where as SSL works at the application layer of OSI model



3. Which of the following is a standard secure email protection protocol?

A) S/MIME
B) SSH
C) SET
D) S/HTTP



4. Which of the following statement correctly describes the differences between tunnel mode and transport mode of the IPSec protocol?

A) In transport mode the ESP is encrypted where as in tunnel mode the ESP and its header's are encrypted
B) In tunnel mode the ESP is encrypted where as in transport mode the ESP and its header's are encrypted
C) In both modes (tunnel and transport mode) the ESP and its header's are encrypted
D) There is no encryption provided when using ESP or AH



5. Which of the following is the unique identifier within and IPSec packet that enables the sending host to reference the security parameter to apply?

A) SPI
B) SA
C) ESP
D) AH



1. Right Answer: A
Explanation: In one way authentication only server needs to be authenticated where as in mutual authentication both the client and the server needs to be authenticated.For CISA exam you should know the information below about Secure Socket Layer (SSL) and Transport Layer Security (TLS)These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.SSL involves a number of basic phasesPeer negotiation for algorithm supportPublic-key, encryption based key exchange and certificate based authenticationSymmetric cipher based traffic encryption.SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiates the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.The following were incorrect answers:The other choices presented in the options are not valid as in one way authentication only server needs to be authenticated where as client will remain unauthenticated.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 352

2. Right Answer: B
Explanation: For your exam you should know below information about S/HTTP and SSL protocol:Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits individual messages or pages securely between a web client and server by establishing SSL-type connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to a secure port number rather than the default web port address. This protocol utilizes SSL secure features but does so as a message rather than the session-oriented protocol.Secure Socket Layer (SSL) and Transport Layer Security (TLS) - These are cryptographic protocols which provide secure communication on Internet. There are only slight difference between SSL 3.0 and TLS 1.0. For general concept both are called SSL.SSL is session-connection layer protocol widely used on Internet for communication between browser and web servers, where any amount of data is securely transmitted while a session is established. SSL provides end point authentication and communication privacy over the Internet using cryptography. In typical use, only the server is authenticated while client remains unauthenticated. Mutual authentication requires PKI development to clients. The protocol allows application to communicate in a way designed to prevent eavesdropping, tampering and message forging.SSL involves a number of basic phasesPeer negotiation for algorithm supportPublic-key, encryption based key exchange and certificate based authenticationSymmetric cipher based traffic encryption.SSL runs on a layer beneath application protocol such as HTTP, SMTP and Network News Transport Protocol (NNTP) and above the TCP transport protocol, which forms part of TCP/IP suite.SSL uses a hybrid hashed, private and public key cryptographic processes to secure transmission over the INTERNET through a PKI.The SSL handshake protocol is based on the application layer but provides for the security of the communication session too. It negotiates the security parameter for each communication section. Multiple session can belong to one SSL session and the participating in one session can take part in multiple simultaneous sessions.The following were incorrect answers:The other choices presented in the options are not valid asSSL works at transport layer where as S/HTTP works at application layer of OSI model.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 352

3. Right Answer: A
Explanation: Secure Multipurpose Internet Mail Extension (S/MIME) is a standard secure email protocol that authenticates the identity of the sender and receiver, verifies message integrity, and ensures the privacy of message's content's, including attachments.The following were incorrect answers:SSH ''A client server program that opens a secure, encrypted command-line shell session from the Internet for remote logon. Similar to a VPN, SSH uses strong cryptography to protect data, including password, binary files and administrative commands, transmitted between system on a network. SSH is typically implemented between two parties by validating each other's credential via digital certificates. SSH is useful in securing Telnet and FTP services, and is implemented at the application layer, as opposed to operating at network layer (IPSec Implementation)SET '' SET is a protocol developed jointly by VISA and Master Card to secure payment transaction among all parties involved in credit card transactions among all parties involved in credit card transactions on behalf of cardholders and merchants. As an open system specification, SET is a application-oriented protocol that uses trusted third party's encryption and digital-signature process, via PKI infrastructure of trusted third party institutions, to address confidentiality of information, integrity of data, cardholders authentication, merchant authentication and interoperability.Secure Hypertext Transfer Protocol (S/HTTP) -As an application layer protocol, S/HTTP transmits individual messages or pages securely between a web client and server by establishing SSL-type connection. Using the https:// designation in the URL, instead of the standard http://, directs the message to a secure port number rather than the default web port address. This protocol utilizes SSL secure features but does so as a message rather than the session-oriented protocol.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 352 and 353

4. Right Answer: A
Explanation: ESP can be used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and(limited) traffic flow confidentiality. The set of services provided depends on options selected at the time of Security Association (SA) establishment and on the location of the implementation in a network topology. For your exam you should know the information below about the IPSec protocol:The IP network layer packet security protocol establishes VPNs via transport and tunnel mode encryption methods.For the transport method, the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it isESP that provides confidentiality over the process.In the tunnel mode, the ESP payload and its header's are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.In establishing IPSec sessions in either mode, Security Associations (SAs) are established. SAs defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc. Within either ESP or AH header, respectively. An SAs is established when a 32-bit security parameter index (SPI) field is defined within the sending host. The SPI is unique identifier that enables the sending host to reference the security parameter to apply, as specified, on the receiving host.IPSec can be made more secure by using asymmetric encryption through the use of Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows automated key management, use of public keys, negotiation, establishment, modification and deletion of SAs and attributes. For authentication, the sender uses digital certificates. The connection is made secure by supporting the generation, authentication, distribution of the SAs and the cryptographic keys.The following were incorrect answers:The other options presented are invalid as the transport mode encrypts ESP and the tunnel mode encrypts ESP and its header's.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 353

5. Right Answer: A
Explanation: The Security Parameter Index (SPI) is the unique identifier that enables the sending host to reference the security parameter to apply in order to decrypt the packet.For your exam you should know the information below about the IPSec protocol:The IP network layer packet security protocol establishes VPNs via transport and tunnel mode encryption methods.For the transport method, the data portion of each packet is encrypted, encryption within IPSEC is referred to as the encapsulation security payload (ESP), it isESP that provides confidentiality over the process.In the tunnel mode, the ESP payload and its header's are encrypted. To achieve non-repudiation, an additional authentication header (AH) is applied.In establishing IPSec sessions in either mode, Security Associations (SAs) are established. SAs defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc. Within either ESP or AH header, respectively. An SAs is established when a 32-bit security parameter index (SPI) field is defined within the sending host. The SPI is unique identifier that enables the sending host to reference the security parameter to apply, as specified, on the receiving host.IPSec can be made more secure by using asymmetric encryption through the use of Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows automated key management, use of public keys, negotiation, establishment, modification and deletion of SAs and attributes. For authentication, the sender uses digital certificates. The connection is made secure by supporting the generation, authentication, distribution of the SAs and the cryptographic keys.The following were incorrect answers:SA '' Security Association (SA) defines which security parameters should be applied between communicating parties as encryption algorithms, key initialization vector, life span of keys, etc.ESP '' Encapsulation Security Payload (ESP) is used to support authentication of sender and encryption of dataAH '' Authentication Header allows authentication of a sender of a data.The following reference(s) were/was used to create this question:CISA review manual 2014 Page number 353

0 Comments

Leave a comment