Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 292

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 292

1. Two-factor authentication can be circumvented through which of the following attacks?

A) Denial-of-service
B) Man-in-the-middle
C) Key logging
D) Brute force



2. An organization can ensure that the recipients of e-mails from its employees can authenticate the identity of the sender by:

A) digitally signing all e-mail messages.
B) encrypting all e-mail messages.
C) compressing all e-mail messages.
D) password protecting all e-mail messages.



3. Sending a message and a message hash encrypted by the sender's private key will ensure:

A) authenticity and integrity.
B) authenticity and privacy.
C) integrity and privacy.
D) privacy and nonrepudiation.



4. Which of the following is a passive attack to a network?

A) Message modification
B) Masquerading
C) Denial of service
D) Traffic analysis



5. An organization has a mix of access points that cannot be upgraded to stronger security and newer access points having advanced wireless security. An IS auditor recommends replacing the non-upgradeable access points. Which of the following would BEST justify the IS auditor's recommendation?

A) The new access points with stronger security are affordable.
B) The old access points are poorer in terms of performance.
C) The organization's security would be as strong as its weakest points.
D) The new access points are easier to manage.



1. Right Answer: B
Explanation: A man-in-the-middle attack is similar to piggybacking, in that the attacker pretends to be the legitimate destination, and then merely retransmits whatever is sent by the authorized user along with additional transactions after authentication has been accepted. A denial-of- service attack does not have a relationship to authentication. Key logging and brute force could circumvent a normal authentication but not a two-factor authentication.

2. Right Answer: A
Explanation: By digitally signing all e-mail messages, the receiver will be able to validate the authenticity of the sender. Encrypting all e-mail messages would ensure that only the intended recipient will be able to open the message; however, it would not ensure the authenticity of the sender. Compressing all e-mail messages would reduce the size of the message, but would not ensure the authenticity. Password protecting all e-mail messages would ensure that only those who have the password would be able to open the message; however, it would not ensure the authenticity of the sender.

3. Right Answer: A
Explanation: If the sender sends both a message and a message hash encrypted by its private key, then the receiver can apply the sender's public key to the hash and get the message hash. The receiver can apply the hashing algorithm to the message received and generate a hash. By matching the generated hash with the one received, the receiver is ensured that the message has been sent by the specific sender, i.e., authenticity, and that the message has not been changed enroute.Authenticity and privacy will be ensured by first using the sender's private key and then the receiver's public key to encrypt the message. Privacy and integrity can be ensured by using the receiver's public key to encrypt the message and sending a message hash/digest. Only nonrepudiation can be ensured by using the sender's private key to encrypt the message. The sender's public key, available to anyone, can decrypt a message; thus, it does not ensure privacy.

4. Right Answer: D
Explanation: The intruder determines the nature of the flow of traffic (traffic analysis) between defined hosts and is able to guess the type of communication taking place.Message modification involves the capturing of a message and making unauthorized changes or deletions, changing the sequence or delaying transmission of captured messages. Masquerading is an active attack in which the intruder presents an identity other than the original identity. Denial of service occurs when a computer connected to the internet is flooded with data and/or requests that must be processed.

5. Right Answer: C
Explanation: The old access points should be discarded and replaced with products having strong security; otherwise, they will leave security holes open for attackers and thus make the entire network as weak as they are. Affordability is not the auditor's major concern. Performance is not as important as security in this situation. Product manageability is not the IS auditor's concern.

0 Comments

Leave a comment