Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CISA 2024 TEST PAPER

Rating
-
Sold
-
Pages
235
Grade
A+
Uploaded on
03-08-2024
Written in
2024/2025

BEST REVISION PAPER WITH ANSWERS

Institution
Course

Content preview

CISA

, In a public key infrastructure (PKI), which of the following may be relied upon to prove
that an online transaction was authorized by a specific customer?



Correct A. Nonrepudiation



B. Encryption



C. Authentication



D. Integrity



. - Answer✔️✔️You are correct, the answer is A.




A. Nonrepudiation, achieved through the use of digital signatures, prevents the senders
from later denying that they generated and sent the message.



B. Encryption may protect the data transmitted over the Internet, but may not prove that
the transactions were made.

, C. Authentication is necessary to establish the identification of all parties to a
communication.



D. Integrity ensures that transactions are accurate but does not provide the identification
of the customer



Which of the following BEST ensures the integrity of a server's operating system (OS)?



A. Protecting the server in a secure location



B. Setting a boot password



Correct C. Hardening the server configuration



D. Implementing activity logging - Answer✔️✔️You are correct, the answer is C.




A. Protecting the server in a secure location is a good practice, but does not ensure that a
user will not try to exploit logical vulnerabilities and compromise the operating system (OS).



B. Setting a boot password is a good practice, but does not ensure that a user will not try
to exploit logical vulnerabilities and compromise the OS.

, C. Hardening a system means to configure it in the most secure manner (install latest
security patches, properly define access authorization for users and administrators, disable
insecure options and uninstall unused services) to prevent nonprivileged users from gaining the
right to execute privileged instructions and, thus, take control of the entire machine, jeopardizing
the integrity of the OS.



D. Activity logging has two weaknesses in this scenario—it is a detective control (not a
preventive one), and the attacker who already gained privileged access can modify logs or
disable them.



The IS auditor is reviewing an organization's human resources (HR) database
implementation. The IS auditor discovers that the database servers are clustered for high
availability, all default database accounts have been removed and database audit logs are kept
and reviewed on a weekly basis. What other area should the IS auditor check to ensure that the
databases are appropriately secured?



A. Database digital signatures



Incorrect B. Database encryption nonces and other variables



C. Database media access control (MAC) address authentication



D. Database initialization parameters - Answer✔️✔️You answered B. The correct answer
is D.

Written for

Course

Document information

Uploaded on
August 3, 2024
Number of pages
235
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.69
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
XPERTISEGRADES

Get to know the seller

Seller avatar
XPERTISEGRADES Phoenix College
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 year
Number of followers
0
Documents
28
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions