Applying a digital signature to data traveling in a network
provides:

A. confidentiality and integrity.

B. security and nonrepudiation.

C. integrity and nonrepudiation.

D. confidentiality and nonrepudiation.

Answers were Sorted based on User's Feedback



Applying a digital signature to data traveling in a network provides: A. confidentiality and int..

Answer / guest

Answer: C

The process of applying a mathematical algorithm to the data
that travels in the network and placing the results of this
operation with the hash data is used for controlling data
integrity, since any unauthorized modification to this data
would result in a be different hash. The application of a
digital signature would accomplish the nonrepudiation of the
delivery of the message. The term security is a broad
concept and not a specific one. In addition to a hash and a
digital signature, confidentiality is applied when an
encryption process exists.

Is This Answer Correct ?    7 Yes 0 No

Applying a digital signature to data traveling in a network provides: A. confidentiality and int..

Answer / adja

Just like a traditional manual signature, when a message is digitally signed it applied that the receiver agreed on the integrity of that document. You don't sign a document you disagree to. It is Non-Repudiation because this signature is unique to that person and a proof of the person's identity (Authentication). So the a digitally signed document can provide INTEGRITY, NON-REPUDIATION and AUTHENTICATION. From all the answers only "C" provides the right answer

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CISA Certification Interview Questions

A control for a company that wants to prevent virus-infected programs (or other type of unauthorized modified programs) would be to: A. utilize integrity checkers. B. verify program's lengths. C. backup the source and object code. D. implement segregation of duties.

2 Answers  


Disaster recovery planning for a company's computer system usually focuses on: A. operations turnover procedures. B. strategic long-range planning. C. the probability that a disaster will occur. D. alternative procedures to process transactions.

1 Answers  


While reviewing the business continuity plan of an organization, the IS auditor observed that the organization's data and software files are backed up on a periodic basis. Which characteristic of an effective plan does this demonstrate? A. Deterrence B. Mitigation C. Recovery D. Response

1 Answers  


Which of the following functions is performed by a virtual private network (VPN)? A. Hiding information from sniffers on the net B. Enforcing security policies C. Detecting misuse or mistakes D. Regulating access

1 Answers  


The PRIMARY purpose of audit trails is to: A. improve response time for users. B. establish accountability and responsibility for processed transactions. C. improve the operational efficiency of the system. D. provide useful information to auditors who may wish to track transactions.

1 Answers  






An IS auditor has just completed a review of an organization that has a mainframe and a client-server environment where all production data reside. Which of the following weaknesses would be considered the MOST serious? A. The security officer also serves as the database administrator (DBA.) B. Password controls are not administered over the client/server environment. C. There is no business continuity plan for the mainframe system?s non-critical applications. D. Most LANs do not back up file server fixed disks regularly.

1 Answers  


The security level of a private key system depends on the number of: A. encryption key bits. B. messages sent. C. keys. D. channels used.

1 Answers  


A programmer included a routine into a payroll application to search for his/her own payroll number. As a result, if this payroll number does not appear during the payroll run, a routine will generate and place random numbers onto every paycheck. This routine is known as: A. scavenging. B. data leakage. C. piggybacking. D. a trojan horse.

1 Answers  


A decision support system (DSS): A. is aimed at solving highly structured problems. B. combines the use of models with nontraditional data access and retrieval functions. C. emphasizes flexibility in the decision making approach of users. D. supports only structured decision-making tasks.

1 Answers  


Which of the following procedures would BEST determine whether adequate recovery/restart procedures exist? A. Reviewing program code B. Reviewing operations documentation C. Turning off the UPS, then the power D. Reviewing program documentation

1 Answers  


IS auditors reviewing access control should review data classification to ensure that encryption parameters are classified as: A. sensitive. B. confidential. C. critical. D. private.

1 Answers  


A PING command is used to measure: A. attenuation. B. throughput. C. delay distortion. D. latency.

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)