100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

CISA Practice Questionsfullysolved7updated

Rating
-
Sold
-
Pages
374
Grade
A+
Uploaded on
24-11-2024
Written in
2024/2025

CISA Practice Questionsfullysolved7updatedIn a public key infrastructure (PKI), which of the followingmaybe relied upon to prove that an online transaction wasauthorized by a specific customer? Correct A. Nonrepudiation B. Encryption C. Authentication D. Integrity . - ANSWER-You are correct, the answer is A. AGRADESTUVIA 2024/2025 AGRADESTUVIA STOREAGRADESTUVIA CONFIDENIAL 2 A. Nonrepudiation, achieved through the use of digital signatures, prevents the senders from later denyingthat theygenerated and sent the message. B. Encryption may protect the data transmitted over theInternet,but may not prove that the transactions were made. C. Authentication is necessary to establish the identificationof all parties to a communication. D. Integrity ensures that transactions are accurate but doesnotprovide the identification of the customer Which of the following BEST ensures the integrity of aserver'soperating system (OS)? A. Protecting the server in a secure location AGRADESTUVIA 2024/2025 AGRADESTUVIA STOREAGRADESTUVIA CONFIDENIAL 3 B. Setting a boot password Correct C. Hardening the server configuration D. Implementing activity logging - ANSWER-You arecorrect, the answer is C. A. Protecting the server in a secure location is a goodpractice,but does not ensure that a user will not try to exploit logical vulnerabilities and compromise the operating system(OS). B. Setting a boot password is a good practice, but doesnot ensure that a user will not try to exploit logical vulnerabilitiesand compromise the OS. C. Hardening a system means to configure it in themost securemanner (install latest security patches, properly defineaccessauthorization for users and administrators, disable insecure AGRADESTUVIA 2024/2025 AGRADESTUVIA STOREAGRADESTUVIA CONFIDENIAL 4 options and uninstall unused services) to prevent nonprivilegedusers from gaining the right to execute privileged instructionsand, thus, take control of the entire machine, jeopardizingtheintegrity of the OS. D. Activity logging has two weaknesses in this scenario—it isadetective control (not a preventive one), and the attacker whoalready gained privileged access can modify logs or disablethem. The IS auditor is reviewing an organization's humanresources(HR) database implementation. The IS auditor discoversthat the database servers are clustered for high availability, all default database accounts have been removed anddatabaseaudit logs are kept and reviewed on a weekly basis. What otherarea should the IS auditor check to ensure that thedatabasesare appropriately secured? A. Database digital signatures AGRADESTUVIA 2024/2025 AGRADESTUVIA STOREAGRADESTUVIA CONFIDENIAL 5 Incorrect B. Database encryption nonces and other variablesC. Database media access control (MAC) address authentication D. Database initialization parameters - ANSWER-Youanswered B. The correct answer is D. A. Digital signatures are used for authentication andnonrepudiation, and are not commonly used in databases. Asaresult, this is not an area in which the IS auditor shouldinvestigate

Show more Read less
Institution
CISA
Course
CISA











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CISA
Course
CISA

Document information

Uploaded on
November 24, 2024
Number of pages
374
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

AGRADESTUVIA 2024/2025 AGRADESTUVIA STORE




CISA Practice Questions fully solved 7
updated
In a public key infrastructure (PKI), which of the following may
be relied upon to prove that an online transaction was
authorized by a specific customer?



Correct A. Nonrepudiation



B. Encryption



C. Authentication



D. Integrity



. - ANSWER-You are correct, the answer is A.




AGRADESTUVIA CONFIDENIAL
1

,AGRADESTUVIA 2024/2025 AGRADESTUVIA STORE




A. Nonrepudiation, achieved through the use of digital
signatures, prevents the senders from later denying that they
generated and sent the message.



B. Encryption may protect the data transmitted over the Internet,
but may not prove that the transactions were made.



C. Authentication is necessary to establish the identification of
all parties to a communication.



D. Integrity ensures that transactions are accurate but does not
provide the identification of the customer



Which of the following BEST ensures the integrity of a server's
operating system (OS)?



A. Protecting the server in a secure location




AGRADESTUVIA CONFIDENIAL
2

,AGRADESTUVIA 2024/2025 AGRADESTUVIA STORE




B. Setting a boot password



Correct C. Hardening the server configuration



D. Implementing activity logging - ANSWER-You are correct,
the answer is C.




A. Protecting the server in a secure location is a good practice,
but does not ensure that a user will not try to exploit logical
vulnerabilities and compromise the operating system (OS).



B. Setting a boot password is a good practice, but does not
ensure that a user will not try to exploit logical vulnerabilities
and compromise the OS.



C. Hardening a system means to configure it in the most secure
manner (install latest security patches, properly define access
authorization for users and administrators, disable insecure
AGRADESTUVIA CONFIDENIAL
3

, AGRADESTUVIA 2024/2025 AGRADESTUVIA STORE




options and uninstall unused services) to prevent nonprivileged
users from gaining the right to execute privileged instructions
and, thus, take control of the entire machine, jeopardizing the
integrity of the OS.



D. Activity logging has two weaknesses in this scenario—it is a
detective control (not a preventive one), and the attacker who
already gained privileged access can modify logs or disable
them.



The IS auditor is reviewing an organization's human resources
(HR) database implementation. The IS auditor discovers that
the database servers are clustered for high availability, all
default database accounts have been removed and database
audit logs are kept and reviewed on a weekly basis. What other
area should the IS auditor check to ensure that the databases
are appropriately secured?



A. Database digital signatures



AGRADESTUVIA CONFIDENIAL
4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Agradestuvia CHAMBERLAIN COLLEGE OF NURSING
Follow You need to be logged in order to follow users or courses
Sold
99
Member since
4 year
Number of followers
73
Documents
1495
Last sold
1 month ago
Verified and Graded A Material and Latest Updated Documents from all courses just for you!! store

On this page, you find all documents, package deals, and flashcards offered by seller agradestuvia. I know how frustrating it can get with all those assignments mate. Nursing Being my main profession line, I have essential guides that are A graded, I am a very friendly person so don\'t hesitate to ask anything that will enable you pass you exams. GOOD LUCK IN YOUR STUDIES .

4,1

30 reviews

5
15
4
6
3
7
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions