Exam CISA All QuestionsBrowse all questions from this exam
Question 1059

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?

    Correct Answer: B

    The greatest concern for an IS auditor regarding the transportation of sensitive data between offices would be if the method relies exclusively on the use of digital signatures. Digital signatures are used primarily for data integrity and authentication rather than encryption. This means they do not provide confidentiality, which is crucial when transporting sensitive data. Unauthorized individuals could intercept and read the data since it is not encrypted. Ensuring confidentiality through encryption is vital in this context.

Discussion
KAP2HURUFOption: B

While digital signatures can provide data integrity and authentication, they do not necessarily ensure the confidentiality of sensitive data during transport. Digital signatures are primarily used to verify the authenticity and integrity of data, ensuring that it has not been tampered with. However, they do not encrypt the data itself, which means that the content could still be intercepted and read by unauthorized individuals. In contrast, options A, C, and D all involve encryption mechanisms, which play a crucial role in protecting the confidentiality of sensitive data during transport. Encryption ensures that the data is scrambled and can only be deciphered by authorized recipients who possess the appropriate decryption keys.

SuperMaxOption: B

B. The method relies exclusively on the use of digital signatures. Digital signatures are used for data integrity and authentication, not encryption. Relying solely on digital signatures for sensitive data transport without encryption could be a significant concern because it doesn't address the confidentiality of the data. Therefore, option B (relying exclusively on digital signatures) would likely be the greatest concern because it does not address data encryption for confidentiality. However, it's important to consider the specific context and implementation details when making this assessment, as all the options could potentially be a concern if not properly implemented and managed.

saado9Option: B

B. Digital signature

FAGFUROption: A

he greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices is that the method relies exclusively on the use of 128-bit encryption. While 128-bit encryption is generally considered secure, relying exclusively on a single encryption method, especially if it is of a specific bit strength, can be a concern. It's important to have a diversified and robust approach to security, considering factors such as encryption algorithms, key management, and overall cryptographic strength. In summary, while encryption is crucial for securing sensitive data in transit, the concern here is the exclusive reliance on a single encryption strength without considering other aspects of security.

KAP2HURUF

128-bit encryption is considered secure for most purposes. It provides a high level of cryptographic strength and is widely used in various applications, including secure communication protocols like HTTPS and VPNs. However, it is worth noting that the security landscape is constantly evolving, and the strength of encryption algorithms can become weakened over time due to advances in technology and computing power. While 128-bit encryption is currently considered secure, it is always recommended to stay updated with the latest encryption standards and follow best practices in information security.

hohoOption: B

Agree on B, transport use digital signature better protect on PKI

saado9Option: B

B. The method relies exclusively on the use of digital signatures.

BabaPOption: B

This should be B

SwallowsOption: D

Key Management: PKI relies on the secure management of public and private keys. If the keys are compromised or mismanaged, it can lead to unauthorized access to sensitive data.

JONESKAOption: A

The question asked for the greatest concern. so relying on 128 bit encryption raises concerns about potential vulnerabilities, as modern encryption standards typically use higher bit (256) strengths for stronger protection against attacks. So the answer should be A for me.