Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 287

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 287

1. An IS auditor should be MOST concerned with what aspect of an authorized honeypot?

A) The data collected on attack methods
B) The information offered to outsiders on the honeypot
C) The risk that the honeypot could be used to launch further attacks on the organization's infrastructure
D) The risk that the honeypot would be subject to a distributed denial-of-service attack



2. Which of the following should be a concern to an IS auditor reviewing a wireless network?

A) 128-bit static-key WEP (Wired Equivalent Privacy) encryption is enabled.
B) SSID (Service Set IDentifier) broadcasting has been enabled.
C) Antivirus software has been installed in all wireless clients.
D) MAC (Media Access Control) access control filtering has been deployed.



3. Which of the following ensures a sender's authenticity and an e-mail's confidentiality?

A) Encrypting the hash of the message with the sender's private key and thereafter encrypting the hash of the message with the receiver's public key
B) The sender digitally signing the message and thereafter encrypting the hash of the message with the sender's private key
C) Encrypting the hash of the message with the sender's private key and thereafter encrypting the message with the receiver's public key
D) Encrypting the message with the sender's private key and encrypting the message hash with the receiver's public key.



4. An efficient use of public key infrastructure (PKI) should encrypt the:

A) entire message.
B) private key.
C) public key.
D) symmetric session key.



5. Which of the following cryptographic systems is MOST appropriate for bulk data encryption and small devices such as smart cards?

A) DES
B) AES
C) Triple DES
D) RSA



1. Right Answer: C
Explanation: Choice C represents the organizational risk that the honeypot could be used as a point of access to launch further attacks on the enterprise's systems. Choices A and B are purposes for deploying a honeypot, not a concern. Choice D, the risk that the honeypot would be subject to a distributed denial-of-service (DDoS) attack, is not relevant, as the honeypot is not a critical device for providing service.

2. Right Answer: B
Explanation: SSID broadcasting allows a user to browse for available wireless networks and to access them without authorization. Choices A, C and D are used to strengthen a wireless network.

3. Right Answer: C
Explanation: To ensure authenticity and confidentiality, a message must be encrypted twice: first with the sender's private key, and then with the receiver's public key. The receiver can decrypt the message, thus ensuring confidentiality of the message. Thereafter, the decrypted message can be decrypted with the public key of the sender, ensuring authenticity of the message. Encrypting the message with the sender's private key enables anyone to decrypt it.

4. Right Answer: D
Explanation: Public key (asymmetric) cryptographic systems require larger keys (1,024 bits) and involve intensive and time-consuming computations. In comparison, symmetric encryption is considerably faster, yet relies on the security of the process for exchanging the secret key. To enjoy the benefits of both systems, a symmetric session key is exchanged using public key methods, after which it serves as the secret key for encrypting/decrypting messages sent between two parties.

5. Right Answer: B
Explanation: Advanced Encryption Standard (AES), a public algorithm that supports keys from 128 to 256 bits in size, not only provides good security, but provides speed and versatility across a variety of computer platforms. AES runs securely and efficiently on large computers, desktop computers and even small devices such as smart cards. DES is not considered a strong cryptographic solution since its entire key space can be brute forced by large computer systems within a relatively short period of time. Triple DES can take up to three times longer than DES to perform encryption and decryption. RSA keys are large numbers that are suitable only for short messages, such as the creation of a digital signature.

0 Comments

Leave a comment