Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 346

Mary Smith

Mon, 17 Mar 2025

CISA—Certified Information Systems Auditor - Part 346

1. Wi-Fi Protected Access implements the majority of which IEEE standard?

A) 802.11i
B) 802.11g
C) 802.11x
D) 802.11v
E) None of the choices.


2. One major improvement in WPA over WEP is the use of a protocol which dynamically changes keys as the system is used. What protocol is this?

A) SKIP
B) RKIP
C) OKIP
D) EKIP
E) TKIP
F) None of the choices.

3. Which of the following refers to a symmetric key cipher which operates on fixedlength groups of bits with an unvarying transformation?

A) stream cipher
B) block cipher
C) check cipher
D) string cipher
E) None of the choices.


4. Which of the following typically consists of a computer, some real looking data and/or a network site that appears to be part of a production network but which is in fact isolated and well prepared?

A) honeypot
B) superpot
C) IDS
D) IPS
E) firewall
F) None of the choices.

5. Which of the following is a tool you can use to simulate a big network structure on a single computer?

A) honeymoon
B) honeytrap
C) honeytube
D) honeyd
E) None of the choices.


1. Right Answer: A
Explanation: Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.

2. Right Answer: E
Explanation: Wi-Fi Protected Access (WPA / WPA2) is a class of systems to secure wireless computer networks. It implements the majority of the IEEE 802.11i standard, and is designed to work with all wireless network interface cards (but not necessarily with first generation wireless access points). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used.

3. Right Answer: B
Explanation: In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation.A stream cipher, on the other hand, operates on individual digits one at a time.

4. Right Answer: A
Explanation: You may use a honeypot to detect and deflect unauthorized use of your information systems. A typical honeypot consists of a computer, some real looking data and/or a network site that appears to be part of a production network but which is in fact isolated and well prepared for trapping hackers.

5. Right Answer: D
Explanation: honeyd is a GPL licensed software you can use to simulate a big network structure on a single computer.

0 Comments

Leave a comment