Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 274

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 274

1. The MOST important difference between hashing and encryption is that hashing:

A) is irreversible.
B) output is the same length as the original message.
C) is concerned with integrity and security.
D) is the same at the sending and receiving end.



2. Which of the following cryptography options would increase overhead/cost?

A) The encryption is symmetric rather than asymmetric.
B) A long asymmetric encryption key is used.
C) The hash is encrypted rather than the message.
D) A secret key is used.



3. The MOST important success factor in planning a penetration test is:

A) the documentation of the planned testing procedure.
B) scheduling and deciding on the timed length of the test.
C) the involvement of the management of the client organization.
D) the qualifications and experience of staff involved in the test.



4. Which of the following virus prevention techniques can be implemented through hardware?

A) Remote booting
B) Heuristic scanners
C) Behavior blockers
D) Immunizers



5. Which of the following append themselves to files as a protection against viruses?

A) Behavior blockers
B) Cyclical redundancy checkers (CRCs)
C) Immunizers
D) Active monitors



1. Right Answer: A
Explanation: Hashing works one way; by applying a hashing algorithm to a message, a message hash/digest is created. If the same hashing algorithm is applied to the message digest, it will not result in the original message. As such, hashing is irreversible, while encryption is reversible. This is the basic difference between hashing and encryption. Hashing creates an output that is smaller than the original message, and encryption creates an output of the same length as the original message. Hashing is used to verify the integrity of the message and does not address security. The same hashing algorithm is used at the sending and receiving ends to generate and verify the message hash/digest. Encryption will not necessarily use the same algorithm at the sending and receiving and to encrypt and decrypt.

2. Right Answer: B
Explanation: Computer processing time is increased for longer asymmetric encryption keys, and the increase may be disproportionate. For example, one benchmark showed that doubling the length of an RSA key from 512 bits to 1,024 bits caused the decrypt time to increase nearly six-fold. An asymmetric algorithm requires more processing time than symmetric algorithms. A hash is shorter than the original message; therefore, a smaller overhead is required if the hash is encrypted rather than the message. Use of a secret key, as a symmetric encryption key, is generally small and used for the purpose of encrypting user data.

3. Right Answer: C
Explanation: The most important part of planning any penetration test is the involvement of the management of the client organization. Penetration testing without management approval could reasonably be considered espionage and is illegal in many jurisdictions.

4. Right Answer: A
Explanation: Remote booting (e.g., diskless workstations) is a method of preventing viruses, and can be implemented through hardware. Choice C is a detection, not a prevention, although it is hardware-based. Choices B and D are not hard ware-based.

5. Right Answer: C
Explanation: Immunizers defend against viruses by appending sections of themselves to files. They continuously check the file for changes and report changes as possible viral behavior. Behavior blockers focus on detecting potentially abnormal behavior, such as writing to the boot sector or the master boot record, or making changes to executable files. Cyclical redundancy checkers compute a binary number on a known virus-free program that is then stored in a database file. When that program is subsequently called to be executed, the checkers look for changes to the files, compare it to the database and report possible infection if changes have occurred. Active monitors interpret DOS and ROM basic input-output system (BIOS) calls, looking for virus-like actions.

0 Comments

Leave a comment