Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 167

Mary Smith

Thu, 16 Apr 2026

CISA—Certified Information Systems Auditor - Part 167

1. What determines the strength of a secret key within a symmetric key cryptosystem?

A) A combination of key length, degree of permutation, and the complexity of the data- encryption algorithm that uses the key
B) A combination of key length, initial input vectors, and the complexity of the data- encryption algorithm that uses the key
C) A combination of key length and the complexity of the data-encryption algorithm that uses the key
D) Initial input vectors and the complexity of the data-encryption algorithm that uses the key



2. What process is used to validate a subject's identity?

A) Identification
B) Nonrepudiation
C) Authorization
D) Authentication



3. What is often assured through table link verification and reference checks?

A) Database integrity
B) Database synchronization
C) Database normalcy
D) Database accuracy



4. Which of the following should an IS auditor review to determine user permissions that have been granted for a particular resource?

A) Systems logs
B) Access control lists (ACL)
C) Application logs
D) Error logs



5. What should IS auditors always check when auditing password files?

A) That deleting password files is protected
B) That password files are encrypted
C) That password files are not accessible over the network
D) That password files are archived



1. Right Answer: B
Explanation: The strength of a secret key within a symmetric key cryptosystem is determined by a combination of key length, initial input vectors, and the complexity of the data-encryption algorithm that uses the key.

2. Right Answer: D
Explanation: Authentication is used to validate a subject's identity.

3. Right Answer: A
Explanation: Database integrity is most often ensured through table link verification and reference checks.

4. Right Answer: B
Explanation: IS auditors should review access-control lists (ACL) to determine user permissions that have been granted for a particular resource.

5. Right Answer: B
Explanation: IS auditors should always check to ensure that password files are encrypted.

0 Comments

Leave a comment