Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 145

Mary Smith

Mon, 24 Mar 2025

CISA—Certified Information Systems Auditor - Part 145

1. What type of cryptosystem is characterized by data being encrypted by the sender using the recipient's public key, and the data then being decrypted using the recipient's private key?

A) With public-key encryption, or symmetric encryption
B) With public-key encryption, or asymmetric encryption
C) With shared-key encryption, or symmetric encryption
D) With shared-key encryption, or asymmetric encryption



2. How does the SSL network protocol provide confidentiality?

A) Through symmetric encryption such as RSA
B) Through asymmetric encryption such as Data Encryption Standard, or DES
C) Through asymmetric encryption such as Advanced Encryption Standard, or AES
D) Through symmetric encryption such as Data Encryption Standard, or DES



3. What are used as the framework for developing logical access controls?

A) Information systems security policies
B) Organizational security policies
C) Access Control Lists (ACL)
D) Organizational charts for identifying roles and responsibilities



4. Which of the following are effective controls for detecting duplicate transactions such as payments made or received?

A) Concurrency controls
B) Reasonableness checks
C) Time stamps
D) Referential integrity controls



5. Which of the following is a good control for protecting confidential data residing on a PC?

A) Personal firewall
B) File encapsulation
C) File encryption
D) Host-based intrusion detection



1. Right Answer: B
Explanation: With public key encryption or asymmetric encryption, data is encrypted by the sender using the recipient's public key; the data is then decrypted using the recipient's private key.

2. Right Answer: D
Explanation: The SSL protocol provides confidentiality through symmetric encryption such as Data Encryption.Standard, or DES.

3. Right Answer: A
Explanation: Information systems security policies are used as the framework for developing logical access controls.

4. Right Answer: C
Explanation: Time stamps are an effective control for detecting duplicate transactions such as payments made or received.

5. Right Answer: C
Explanation: File encryption is a good control for protecting confidential data residing on a PC.

0 Comments

Leave a comment