Applying a digital signature to data traveling in a network
provides:

A. confidentiality and integrity.

B. security and nonrepudiation.

C. integrity and nonrepudiation.

D. confidentiality and nonrepudiation.

Answers were Sorted based on User's Feedback



Applying a digital signature to data traveling in a network provides: A. confidentiality and int..

Answer / guest

Answer: C

The process of applying a mathematical algorithm to the data
that travels in the network and placing the results of this
operation with the hash data is used for controlling data
integrity, since any unauthorized modification to this data
would result in a be different hash. The application of a
digital signature would accomplish the nonrepudiation of the
delivery of the message. The term security is a broad
concept and not a specific one. In addition to a hash and a
digital signature, confidentiality is applied when an
encryption process exists.

Is This Answer Correct ?    7 Yes 0 No

Applying a digital signature to data traveling in a network provides: A. confidentiality and int..

Answer / adja

Just like a traditional manual signature, when a message is digitally signed it applied that the receiver agreed on the integrity of that document. You don't sign a document you disagree to. It is Non-Repudiation because this signature is unique to that person and a proof of the person's identity (Authentication). So the a digitally signed document can provide INTEGRITY, NON-REPUDIATION and AUTHENTICATION. From all the answers only "C" provides the right answer

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

The PRIMARY purpose of compliance tests is to verify whether: A. controls are implemented as prescribed. B. documentation is accurate and current. C. access to users is provided as specified. D. data validation procedures are provided.

1 Answers  


52. Which of the following tests confirm that the new system can operate in its target environment?

1 Answers  


Which of the following line media would provide the BEST security for a telecommunication network? A. Broad band network digital transmission B. Baseband network C. Dial-up D. Dedicated lines

1 Answers  


Which of the following is the MOST important function to be performed by IS management when a service has been outsource? A. Ensuring that invoices are paid to the provider B. Participating in systems design with the provider C. Renegotiating the provider's fees D. Monitoring the outsourcing provider's performance

2 Answers  


A probable advantage to an organization that has outsourced its data processing services is that: A. needed IS expertise can be obtained from the outside. B. greater control can be exercised over processing. C. processing priorities can be established and enforced internally. D. greater user involvement is required to communicate user needs.

1 Answers  






The role of IT auditor in complying with the Management Assessment of Internal Controls (Section 404 of the Sarbanes-Oxley Act) is: A. planning internal controls B. documenting internal controls C. designing internal controls D. implementing internal controls

1 Answers  


An IS auditor performing a telecommunication access control review should be concerned PRIMARILY with the: A. maintenance of access logs of usage of various system resources. B. authorization and authentication of the user prior to granting access to system resources. C. adequate protection of stored data on servers by encryption or other means. D. accountability system and the ability to identify any terminal accessing system resources.

2 Answers  


Change control procedures to prevent scope creep during an application development project should be defined during: A. design. B. feasibility. C. implementation. D. requirements definition.

2 Answers  


Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist? A. Reviewing program code B. Reviewing operations documentation C. Turning off the UPS, then the power D. Reviewing program documentation

1 Answers  


An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems. Under the SSO system, unauthorized access: A. is less likely. B. is more likely. C. will have a greater impact. D. will have a smaller impact.

1 Answers  


An organization has an integrated development environment (IDE), where the program libraries reside on the server, but modification/development and testing are done from PC workstations. Which of the following would be a strength of an integrated development environment? A. Controls the proliferation of multiple versions of programs B. Expands the programming resources and aids available C. Increases program and processing integrity D. Prevents valid changes from being overwritten by other changes

1 Answers  


Which of the following would be of MOST concern to an IS auditor reviewing a VPN implementation? Computers on the network that are located: A. on the enterprise's facilities. B. at the backup site. C. in employees' homes. D. at the enterprise's remote offices.

1 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)