CISA Questions (701-800) Questions &
100% Correct Answers
Digital signatures require the:
Select an answer:
A.
signer to have a public key and the receiver to have a private key.
B.
signer to have a private key and the receiver to have a public key.
C.
signer and receiver to have a public key.
D.
signer and receiver to have a private key.
✓ :~~ You answered D. The correct answer is B.
A. If a sender encrypts a message with a public key, it will provide confidential
transmission to the receiver with the private key.
Master01 | September, 2024/2025 | Latest update
, 2 | P a g e | © copyright 2024/2025 | Grade A+
B. Digital signatures are intended to verify to a recipient the integrity of the data
and the identity of the sender. The digital signature standard is based on the
sender encrypting a digest of the message with their private key and the receiver
validating the message with the public key.
C. Asymmetric key cryptography always works with key pairs. Therefore, a
message encrypted with a public key could only be opened with a private key.
D. If both the sender and receiver have a private key there would be no way to
validate the digital signature.
The feature of a digital signature that ensures the sender cannot later deny
generating and sending the message is called:
Select an answer:
A.
data integrity.
B.
authentication.
Master01 | September, 2024/2025 | Latest update
, 3 | P a g e | © copyright 2024/2025 | Grade A+
C.
nonrepudiation.
D.
replay protection.
✓ :~~ You are correct, the answer is C.
A. Data integrity refers to changes in the plaintext message that would result in
the recipient failing to compute the same message hash.
B. Because only the claimed sender has the private key used to create the digital
signature, authentication ensures that the message has been sent by the claimed
sender.
C. Integrity, authentication, nonrepudiation and replay protection are all features
of a digital signature. Nonrepudiation ensures that the claimed sender cannot later
deny generating and sending the message.
D. Replay protection is a method that a recipient can use to check that the
message was not intercepted and re-sent (replayed).
Master01 | September, 2024/2025 | Latest update
, 4 | P a g e | © copyright 2024/2025 | Grade A+
Which of the following controls would BEST detect intrusion?
Select an answer:
A.
User IDs and user privileges are granted through authorized procedures.
B.
Automatic logoff is used when a workstation is inactive for a particular period of
time.
C.
Automatic logoff of the system occurs after a specified number of unsuccessful
attempts.
D.
Unsuccessful logon attempts are monitored by the security administrator.
✓ :~~ You are correct, the answer is D.
A. User IDs and the granting of user privileges define a policy. This is a type of
administrative or managerial control that may prevent intrusion but would not
detect it.
Master01 | September, 2024/2025 | Latest update