Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 290

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 290

1. Validated digital signatures in an e-mail software application will:

A) help detect spam.
B) provide confidentiality.
C) add to the workload of gateway servers.
D) significantly reduce available bandwidth.



2. In transport mode, the use of the Encapsulating Security Payload (ESP) protocol is advantageous over the Authentication Header (AH) protocol because it provides:

A) connectionless integrity.
B) data origin authentication.
C) antireplay service.
D) confidentiality.



3. An IS auditor notes that IDS log entries related to port scanning are not being analyzed. This lack of analysis will MOST likely increase the risk of success of which of the following attacks?

A) Denial-of-service
B) Replay
C) Social engineering
D) Buffer overflow



4. IS management recently replaced its existing wired local area network (LAN) with a wireless infrastructure to accommodate the increased use of mobile devices within the organization. This will increase the risk of which of the following attacks?

A) Port scanning
B) Back door
C) Man-in-the-middle
D) War driving



5. Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

A) 128-bit wired equivalent privacy (WEP)
B) MAC-based pre-shared key(PSK)
C) Randomly generated pre-shared key (PSKJ
D) Alphanumeric service set identifier (SSID)



1. Right Answer: A
Explanation: Validated electronic signatures are based on qualified certificates that are created by a certification authority (CA), with the technical standards required to ensure the key can neither be forced nor reproduced in a reasonable time. Such certificates are only delivered through a registration authority (RA) after a proof of identity has been passed. Using strong signatures in e- mail traffic, nonrepudiation can be assured and a sender can be tracked. The recipient can configure their e-mail server or client to automatically delete e-mails from specific senders. For confidentiality issues, one must use encryption, not a signature, although both methods can be based on qualified certificates. Without any filters directly applied on mail gateway servers to block traffic without strong signatures, the workload will not increase. Using filters directly on a gateway server will result in an overhead less than antivirus software imposes. Digital signatures are only a few bytes in size and will not slash bandwidth. Even if gateway servers were to check CRLs, there is little overhead.

2. Right Answer: D
Explanation: Both protocols support choices A, B and C, but only the ESP protocol provides confidentiality via encryption.

3. Right Answer: A
Explanation: Prior to launching a denial-of-service attack, hackers often use automatic port scanning software to acquire information about the subject of their attack. A replay attack is simply sending the same packet again. Social engineering exploits end-user vulnerabilities, and buffer overflow attacks exploit poorly written code.

4. Right Answer: D
Explanation: A war driving attack uses a wireless Ethernet card, set in promiscuous mode, and a powerful antenna to penetrate wireless systems from outside. Port scanning will often target the external firewall of the organization. A back door is an opening left in software that enables an unknown entry into a system. Man-in-the-middle attacks intercept a message and either replace or modify it.

5. Right Answer: C
Explanation: A randomly generated PSK is stronger than a MAC-based PSK, because the MAC address of a computer is fixed and often accessible. WEP has been shown to be a very weak encryption technique and can be cracked within minutes. The SSID is broadcast on the wireless network in plaintext.

0 Comments

Leave a comment