FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. CISA Exam
  4. ISACA.CISA.v2024-12-27.q999 Dumps
  • ««
  • «
  • …
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • …
  • »
  • »»
Download Now

Question 221

The role of the certificate authority (CA) as a third party is to:

Correct Answer: D
Section: Protection of Information Assets
Explanation:
The primary activity of a CA is to issue certificates. The primary role of the CA is to check the identity of the entity owning a certificate and to confirm the integrity of any certificate it issued. Providing a communication infrastructure is not a CA activity. The secret keys belonging to the certificates would not be archived at the CA. The CA can contribute to authenticating the communicating partners to each other, but the CA is not involved in the communication stream itself.
insert code

Question 222

An appropriate control for ensuring the authenticity of orders received in an EDI application is to:

Correct Answer: C
Section: Protection of Information Assets
Explanation:
An electronic data interchange (EDI) system is subject not only to the usual risk exposures of computer
systems but also to those arising from the potential ineffectiveness of controls on the part of the trading
partner and the third-party service provider, making authentication of users and messages a major security
concern. Acknowledging the receipt of electronic orders with a confirming message is good practice but will
not authenticate orders from customers. Performing reasonableness checks on quantities ordered before
placing orders is a control for ensuring the correctness of the company's orders, not the authenticity of its
customers' orders. Encrypting sensitive messages is an appropriate step but does not apply to messages
received.
insert code

Question 223

An organization globally distributes a free phone application that includes a module to gather and report user information. The application includes a privacy notice alerting users to the data gathering. Which of the following presents the GREATEST risk?

Correct Answer: D
Section: Protection of Information Assets
insert code

Question 224

When protecting an organization's IT systems, which of the following is normally the next line of defense
after the network firewall has been compromised?

Correct Answer: C
Section: Protection of Information Assets
Explanation:
An intrusion detection system (IDS) would be the next line of defense after the firewall. It would detect
anomalies in the network/server activity and try to detect the perpetrator. Antivirus programs, personal
firewalls and VIAN configurations would be later in the line of defense.
insert code

Question 225

To ensure confidentiality through the use of asymmetric encryption, a message is encrypted with which of the following?

Correct Answer: A
insert code
  • ««
  • «
  • …
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • …
  • »
  • »»
[×]

Download PDF File

Enter your email address to download ISACA.CISA.v2024-12-27.q999 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.