Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 281

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 281

1. An internet-based attack using password sniffing can:

A) enable one party to act as if they are another party.
B) cause modification to the contents of certain transactions.
C) be used to gain access to systems containing proprietary information.
D) result in major problems with billing systems and transaction processing agreements.



2. Which of the following controls would be the MOST comprehensive in a remote access network with multiple and diverse subsystems?

A) Proxy server
B) Firewall installation
C) Network administrator
D) Password implementation and administration



3. During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used?

A) A biometric, digitalized and encrypted parameter with the customer's public key
B) A hash of the data that is transmitted and encrypted with the customer's private key
C) A hash of the data that is transmitted and encrypted with the customer's public key
D) The customer's scanned signature encrypted with the customer's public key



4. When planning an audit of a network setup, an IS auditor should give highest priority to obtaining which of the following network documentation?

A) Wiring and schematic diagram
B) Users' lists and responsibilities
C) Application lists and their details
D) Backup and recovery procedures



5. Which of the following encrypt/decrypt steps provides the GREATEST assurance of achieving confidentiality, message integrity and nonrepudiation by either sender or recipient?

A) The recipient uses their private key to decrypt the secret key.
B) The encrypted prehash code and the message are encrypted using a secret key.
C) The encrypted prehash code is derived mathematically from the message to be sent.
D) The recipient uses the sender's public key, verified with a certificate authority, to decrypt the prehash code.



1. Right Answer: C
Explanation: Password sniffing attacks can be used to gain access to systems on which proprietary information is stored. Spoofing attacks can be used to enable one party to act as if they are another party. Data modification attacks can be used to modify the contents of certain transactions. Repudiation of transactions can cause major problems with billing systems and transaction processing agreements.

2. Right Answer: D
Explanation: The most comprehensive control in this situation is password implementation and administration. While firewall installations are the primary line of defense, they cannot protect all access and, therefore, an element of risk remains. A proxy server is a type of firewall installation; thus, the same rules apply. The network administrator may serve as a control, but typically this would not be comprehensive enough to serve on multiple and diverse systems.

3. Right Answer: B
Explanation: The calculation of a hash, or digest, of the data that are transmitted and its encryption require the public key of the client (receiver) and is called a signature of the message, or digital signature.The receiver performs the same process and then compares the received hash, once it has been decrypted with their private key, to the hash that is calculated with the received data. If they are the same, the conclusion would be that there is integrity in the data that have arrived and the origin is authenticated. The concept of encrypting the hash with the private key of the originator provides non repudiation, as it can only be decrypted with their public key and, as the CD suggests, the private key would not be known to the recipient. Simply put, in a key-pair situation, anything that can be decrypted by a sender's public key must have been encrypted with their private key, so they must have been the sender, i.e., non-repudiation. Choice C is incorrect because, if this were the case, the hash could not be decrypted by the recipient, so the benefit of non-repudiation would be lost and there could be no verification that the message had not been intercepted and amended. A digital signature is created by encrypting with a private key. A person creating the signature uses their own private key, otherwise everyone would be able to create a signature with any public key. Therefore, the signature of the client is created with the client's private key, and this can be verified''by the enterprise''using the client's public key. Choice B is the correct answer because, in this case, the customer uses their private key to sign the hash data.

4. Right Answer: A
Explanation: The wiring and schematic diagram of the network is necessary to carry out a network audit. A network audit may not be feasible if a network wiring and schematic diagram is not available. All other documents are important but not necessary.

5. Right Answer: D
Explanation: Most encrypted transactions use a combination of private keys, public keys, secret keys, hash functions and digital certificates to achieve confidentiality, message integrity and nonrepudiation by either sender or recipient. The recipient uses the sender's public key to decrypt the prehash code into a posthash code, which when equaling the prehash code, verifies the identity of the sender and that the message has not been changed in route; this would provide the greatest assurance. Each sender and recipient has a private key known only to themselves and a public key, which can be known by anyone. Each encryption/decryption process requires at least one public key and one private key, and both must be from the same party. A single, secret key is used to encrypt the message, because secret key encryption requires less processing power than using public and private keys. A digital certificate, signed by a certificate authority, validates senders' and recipients' public keys.

0 Comments

Leave a comment