CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 1065


Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?

Show Answer
Correct Answer: B

The greatest concern for an IS auditor regarding the transportation of sensitive data between offices would be if the method relies exclusively on the use of digital signatures. Digital signatures are used primarily for data integrity and authentication rather than encryption. This means they do not provide confidentiality, which is crucial when transporting sensitive data. Unauthorized individuals could intercept and read the data since it is not encrypted. Ensuring confidentiality through encryption is vital in this context.

Discussion

10 comments
Sign in to comment
KAP2HURUFOption: B
Jun 27, 2024

While digital signatures can provide data integrity and authentication, they do not necessarily ensure the confidentiality of sensitive data during transport. Digital signatures are primarily used to verify the authenticity and integrity of data, ensuring that it has not been tampered with. However, they do not encrypt the data itself, which means that the content could still be intercepted and read by unauthorized individuals. In contrast, options A, C, and D all involve encryption mechanisms, which play a crucial role in protecting the confidentiality of sensitive data during transport. Encryption ensures that the data is scrambled and can only be deciphered by authorized recipients who possess the appropriate decryption keys.

saado9
Nov 5, 2023

B. Digital signature

SuperMaxOption: B
Apr 2, 2024

B. The method relies exclusively on the use of digital signatures. Digital signatures are used for data integrity and authentication, not encryption. Relying solely on digital signatures for sensitive data transport without encryption could be a significant concern because it doesn't address the confidentiality of the data. Therefore, option B (relying exclusively on digital signatures) would likely be the greatest concern because it does not address data encryption for confidentiality. However, it's important to consider the specific context and implementation details when making this assessment, as all the options could potentially be a concern if not properly implemented and managed.

BabaPOption: B
Nov 6, 2023

This should be B

saado9
Nov 7, 2023

B. The method relies exclusively on the use of digital signatures.

hoho
Dec 10, 2023

Agree on B, transport use digital signature better protect on PKI

FAGFUROption: A
May 14, 2024

he greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices is that the method relies exclusively on the use of 128-bit encryption. While 128-bit encryption is generally considered secure, relying exclusively on a single encryption method, especially if it is of a specific bit strength, can be a concern. It's important to have a diversified and robust approach to security, considering factors such as encryption algorithms, key management, and overall cryptographic strength. In summary, while encryption is crucial for securing sensitive data in transit, the concern here is the exclusive reliance on a single encryption strength without considering other aspects of security.

KAP2HURUF
Jun 27, 2024

128-bit encryption is considered secure for most purposes. It provides a high level of cryptographic strength and is widely used in various applications, including secure communication protocols like HTTPS and VPNs. However, it is worth noting that the security landscape is constantly evolving, and the strength of encryption algorithms can become weakened over time due to advances in technology and computing power. While 128-bit encryption is currently considered secure, it is always recommended to stay updated with the latest encryption standards and follow best practices in information security.

JONESKA
Jan 24, 2024

The question asked for the greatest concern. so relying on 128 bit encryption raises concerns about potential vulnerabilities, as modern encryption standards typically use higher bit (256) strengths for stronger protection against attacks. So the answer should be A for me.

SwallowsOption: D
Nov 19, 2024

Key Management: PKI relies on the secure management of public and private keys. If the keys are compromised or mismanaged, it can lead to unauthorized access to sensitive data.

SayakSibOption: C
Feb 23, 2025

C is 1000%