Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISA Topic 6 Question 81 Discussion

Actual exam question for Isaca's CISA exam
Question #: 81
Topic #: 6
[All CISA Questions]

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?

Show Suggested Answer Hide Answer
Suggested Answer: C

The greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices should be the use of asymmetric encryption algorithms. Asymmetric encryption algorithms are a type of encryption that uses two different keys, one public and one private, to encrypt and decrypt data. The public key is used to encrypt the data and the private key is used to decrypt it. This system is more secure than other methods, such as 128-bit encryption, as it ensures that only the sender and receiver of the data are able to access the data. However, this system can be vulnerable to attacks if the keys are not properly secured.


Contribute your Thoughts:

Leonida
11 months ago
128-bit encryption? Psh, I encrypt my grocery list with 256-bit. Gotta go big or go home with sensitive data.
upvoted 0 times
Freeman
10 months ago
Nidia: 128-bit encryption? Psh, I encrypt my grocery list with 256-bit. Gotta go big or go home with sensitive data.
upvoted 0 times
...
Bulah
10 months ago
D) The method relies exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
Nidia
10 months ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Bobbye
11 months ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
...
Lai
11 months ago
Asymmetric encryption? Sounds like a fancy way to say 'not secure enough' for sensitive data.
upvoted 0 times
...
Thea
11 months ago
Digital signatures are great, but they won't stop someone from intercepting the data. Need more layers of security.
upvoted 0 times
Donette
9 months ago
C) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Veronika
9 months ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Hannah
9 months ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
Quentin
9 months ago
C) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Dong
9 months ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Shaun
11 months ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
...
Malcom
11 months ago
I see both points, but I think the method relying exclusively on the use of asymmetric encryption algorithms could also be a concern.
upvoted 0 times
...
Zana
11 months ago
I disagree, I believe the greatest concern should be the method relying exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Margurite
12 months ago
I think the greatest concern should be the method relying exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
Carole
12 months ago
Using only PKI? That's like trying to catch a fish with a spoon. Not a good idea for sensitive data transport.
upvoted 0 times
Felix
11 months ago
D) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Jenise
11 months ago
C) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
Jarod
11 months ago
B) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Armando
11 months ago
A) The method relies exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77