Inspirational journeys

Follow the stories of academics and their research expeditions

CISA—Certified Information Systems Auditor - Part 332

Mary Smith

Sun, 19 Apr 2026

CISA—Certified Information Systems Auditor - Part 332

1. Why is one-time pad not always preferable for encryption (choose all that apply):(Select 2answers)

A) it is difficult to use securely.
B) it is highly inconvenient to use.
C) it requires licensing fee.
D) it requires internet connectivity.
E) it is Microsoft only.
F) None of the choices.

2. You may reduce a cracker's chances of success by (choose all that apply):(Select 2answers)

A) keeping your systems up to date using a security scanner.
B) hiring competent people responsible for security to scan and update your systems.
C) using multiple firewalls.
D) using multiple firewalls and IDS.
E) None of the choices.


3. Which of the following measures can protect systems files and data, respectively?

A) User account access controls and cryptography
B) User account access controls and firewall
C) User account access controls and IPS
D) IDS and cryptography
E) Firewall and cryptography
F) None of the choices.

4. Which of the following is by far the most common prevention system from a network security perspective?

A) Firewall
B) IDS
C) IPS
D) Hardened OS
E) Tripwire
F) None of the choices.

5. Which of the following are designed to detect network attacks in progress and assist in post- attack forensics?

A) Intrusion Detection Systems
B) Audit trails
C) System logs
D) Tripwire
E) None of the choices.


1. Right Answer: A,B
Explanation: It's possible to protect messages in transit by means of cryptography. One method of encryption - the one-time pad - has been proven to be unbreakable when correctly used. This method uses a matching pair of key- codes, securely distributed, which are used once-and-only-once to encode and decode a single message. Note that this method is difficult to use securely, and is highly inconvenient as well.

2. Right Answer: A,B
Explanation: Only a small fraction of computer program code is mathematically proven, or even goes through comprehensive information technology audits or inexpensive but extremely valuable computer security audits, so it is quite possible for a determined cracker to read, copy, alter or destroy data in well secured computers, albeit at the cost of great time and resources. You may reduce a cracker's chances by keeping your systems up to date, using a security scanner or/and hiring competent people responsible for security.

3. Right Answer: A
Explanation: User account access controls and cryptography can protect systems files and data, respectively. On the other hand, firewalls are by far the most common prevention systems from a network security perspective as they can shield access to internal network services, and block certain kinds of attacks through packet filtering.

4. Right Answer: A
Explanation: User account access controls and cryptography can protect systems files and data, respectively. On the other hand, firewalls are by far the most common prevention systems from a network security perspective as they can shield access to internal network services, and block certain kinds of attacks through packet filtering.

5. Right Answer: A
Explanation: Intrusion Detection Systems are designed to detect network attacks in progress and assist in post-attack forensics, while audit trails and logs serve a similar function for individual systems.

0 Comments

Leave a comment