Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 298

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 298

1. Which of the following would be the GREATEST cause for concern when data are sent over the Internet using HTTPS protocol?

A) Presence of spyware in one of the ends
B) The use of a traffic sniffing tool
C) The implementation of an RSA-compliant solution
D) A symmetric cryptography is used for transmitting data



2. A firewall is being deployed at a new location. Which of the following is the MOST important factor in ensuring a successful deployment?

A) Reviewing logs frequently
B) Testing and validating the rules
C) Training a local administrator at the new location
D) Sharing firewall administrative duties



3. The human resources (HR) department has developed a system to allow employees to enroll in benefits via a web site on the corporate Intranet. Which of the following would protect the confidentiality of the data?

A) SSL encryption
B) Two-factor authentication
C) Encrypted session cookies
D) IP address verification



4. What is the MOST prevalent security risk when an organization implements remote virtual private network (VPN) access to its network?

A) Malicious code could be spread across the network
B) VPN logon could be spoofed
C) Traffic could be sniffed and decrypted
D) VPN gateway could be compromised



5. The use of digital signatures:

A) requires the use of a one-time password generator.
B) provides encryption to a message.
C) validates the source of a message.
D) ensures message confidentiality.



1. Right Answer: A
Explanation: Encryption using secure sockets layer/transport layer security (SSL/TLS) tunnels makes it difficult to intercept data in transit, but when spyware is running on an end user's computer, data are collected before encryption takes place. The other choices are related to encrypting the traffic, but the presence of spyware in one of the ends captures the data before encryption takes place.

2. Right Answer: B
Explanation: A mistake in the rule set can render a firewall insecure. Therefore, testing and validating the rules is the most important factor in ensuring a successful deployment. A regular review of log files would not start until the deployment has been completed. Training a local administrator may not be necessary if the firewalls are managed from a central location. Having multiple administrators is a good idea, but not the most important.

3. Right Answer: A
Explanation: The main risk in this scenario is confidentiality, therefore the only option which would provide confidentiality is Secure Socket Layer (SSL) encryption. The remaining options deal with authentication issues.

4. Right Answer: A
Explanation: VPN is a mature technology; VPN devices are hard to break. However, when remote access is enabled, malicious code in a remote client could spread to the organization's network. Though choices B, C and D are security risks, VPN technology largely mitigates these risks.

5. Right Answer: C
Explanation: The use of a digital signature verifies the identity of the sender, but does not encrypt the whole message, and hence is not enough to ensure confidentiality. A one- time password generator is an option, but is not a requirement for using digital signatures.

0 Comments

Leave a comment