O'Reilly logo

CISA® Certified Information Systems Auditor®: Study Guide, Third Edition by David Cannon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Review Questions

1. Digital signatures are primarily designed to provide additional protection with electronic messages in order to ensure which of the following?

A. Provide verification of the sender’s identity

B. Prevent the message from being read by an unauthorized party

C. Provide availability of the message

D. Protect content of the message using encryption

2. Internet communication requires more security. To audit Internet security and access control, the IS auditor will first need to examine what?

A. Validity of password changes

B. Architecture of the client/server application

C. Network architecture and design

D. Virus protection and firewall servers

3. What is the best method for an organization to allow its business partners to access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required