Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 133

Mary Smith

Sat, 12 Jul 2025

CISA—Certified Information Systems Auditor - Part 133

1. A data administrator is responsible for:

A) maintaining database system software.
B) defining data elements, data names and their relationship.
C) developing physical database structures.
D) developing data dictionary system software.



2. A database administrator is responsible for:

A) defining data ownership.
B) establishing operational standards for the data dictionary.
C) creating the logical and physical database.
D) establishing ground rules for ensuring data integrity and security.



3. An IS auditor reviewing the key roles and responsibilities of the database administrator (DBA) is LEAST likely to expect the job description of the DBA to include:

A) defining the conceptual schema.
B) defining security and integrity checks.
C) liaising with users in developing data model.
D) mapping data model with the internal schema.



4. To affix a digital signature to a message, the sender must first create a message digest by applying a cryptographic hashing algorithm against:

A) the entire message and thereafter enciphering the message digest using the sender's private key.
B) any arbitrary part of the message and thereafter enciphering the message digest using the sender's private key.
C) the entire message and thereafter enciphering the message using the sender's private key.
D) the entire message and thereafter enciphering the message along with the message digest using the sender's private key.



5. A sequence of bits appended to a digital document that is used to secure an e-mail sent through the Internet is called a:

A) digest signature.
B) electronic signature.
C) digital signature.
D) hash signature.



1. Right Answer: B
Explanation: A data administrator is responsible for defining data elements, data names and their relationship. Choices A, C and D are functions of a database administrator(DBA)

2. Right Answer: C
Explanation: A database administrator is responsible for creating and controlling the logical and physical database. Defining data ownership resides with the head of the user department or top management if the data is common to the organization. IS management and the data administrator are responsible for establishing operational standards for the data dictionary. Establishing ground rules for ensuring data integrity and security in line with the corporate security policy is a function of the security administrator.

3. Right Answer: D
Explanation: A DBA only in rare instances should be mapping data elements from the data model to the internal schema (physical data storage definitions). To do so would eliminate data independence for application systems. Mapping of the data model occurs with the conceptual schema since the conceptual schema represents the enterprise wide view of data within an organization and is the basis for deriving and end-user department data model.

4. Right Answer: A
Explanation: A digital signature is a cryptographic method that ensures data integrity, authentication of the message, and non-repudiation. To ensure these, the sender first creates a message digest by applying a cryptographic hashing algorithm against the entire message and thereafter enciphers the message digest using the sender's private key. A message digest is created by applying a cryptographic hashing algorithm against the entire message not on any arbitrary part of the message. After creating the message digest, only the message digest is enciphered using the sender's private key, not the message.

5. Right Answer: C
Explanation: A digital signature through the private cryptographic key authenticates a transmission from a sender through the private cryptographic key. It is a string of bits that uniquely represent another string of bits, a digital document. An electronic signature refers to the string of bits that digitally represents a handwritten signature captured by a computer system when a human applies it on an electronic pen pad, connected to the system.

0 Comments

Leave a comment