Free CISA Exam Braindumps (page: 13)

Page 12 of 457

On a public-key cryptosystem when there is no previous knowledge between parties, which of the following will BEST help to prevent one person from using a fictitious key to impersonate someone else?

  1. Send a certificate that can be verified by a certification authority with the public key.
  2. Encrypt the message containing the sender's public key, using the recipient's public key.
  3. Send the public key to the recipient prior to establishing the connection.
  4. Encrypt the message containing the sender's public key, using a private-key cryptosystem.

Answer(s): A



The IS quality assurance (QA) group is responsible for:

  1. monitoring the execution of computer processing tasks.
  2. designing procedures to protect data against accidental disclosure.
  3. ensuring that program changes adhere to established standards.
  4. ensuring that the output received from system processing is complete.

Answer(s): C



Which of the following approaches will ensure recovery time objectives (RTOs) are met for an organization's disaster recovery plan (DRP)?

  1. Performing a full interruption test
  2. Performing a parallel test
  3. Performing a tabletop test
  4. Performing a cyber-resilience test

Answer(s): B



Which audit approach is MOST helpful in optimizing the use of IS audit resources?

  1. Agile auditing
  2. Continuous auditing
  3. Risk-based auditing
  4. Outsourced auditing

Answer(s): C






Post your Comments and Discuss ISACA CISA exam with other Community members:

CISA Exam Discussions & Posts