Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 345

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 345

1. Talking about biometric measurement, which of the following measures the percent of invalid users who are incorrectly accepted in?

A) failure to reject rate
B) false accept rate
C) false reject rate
D) failure to enroll rate
E) None of the choices.


2. An accurate biometric system usually exhibits (Choose two.):(Select 2answers)

A) low EER
B) low CER
C) high EER
D) high CER
E) None of the choices.


3. As part of the IEEE 802.11 standard ratified in September 1999, WEP uses which stream cipher for confidentiality?

A) CRC-32
B) CRC-64
C) DES
D) 3DES
E) RC4
F) RC5

4. As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the CRC- 32 checksum for:

A) integrity.
B) validity.
C) accuracy.
D) confidentiality.
E) None of the choices.


5. Many WEP systems require a key in a relatively insecure format. What format is this?

A) binary format.
B) hexadecimal format.
C) 128 bit format.
D) 256 bit format.
E) None of the choices.


1. Right Answer: B
Explanation: Performance of a biometric measure is usually referred to in terms of the false accept rate (FAR), the false non match or reject rate (FRR), and the failure to enroll rate (FTE or FER). The FAR measures the percent of invalid users who are incorrectly accepted in, while the FRR measures the percent of valid users who are wrongly rejected.

2. Right Answer: A,B
Explanation: One most commonly used measure of real-world biometric systems is the rate at which both accept and reject errors are equal: the equal error rate (EER), also known as the cross-over error rate (CER). The lower the EER or CER, the more accurate the system is considered to be.

3. Right Answer: E
Explanation: As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the stream cipher RC4 for confidentiality and the CRC-32 checksum for integrity.

4. Right Answer: A
Explanation: As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the stream cipher RC4 for confidentiality and the CRC-32 checksum for integrity.Many WEP systems require a key in hexadecimal format. If one chooses keys that spell words in the limited 0-9, A-F hex character set, these keys can be easily guessed.

5. Right Answer: B
Explanation: As part of the IEEE 802.11 standard ratified in September 1999, WEP uses the stream cipher RC4 for confidentiality and the CRC-32 checksum for integrity.Many WEP systems require a key in hexadecimal format. If one chooses keys that spell words in the limited 0-9, A-F hex character set, these keys can be easily guessed.

0 Comments

Leave a comment