New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 6 Question 81 Discussion

Actual exam question for Isaca's CISA exam
Question #: 81
Topic #: 6
[All CISA Questions]

Which of the following should be the GREATEST concern to an IS auditor reviewing an organization's method to transport sensitive data between offices?

Show Suggested Answer Hide Answer
Suggested Answer: C

The greatest concern to an IS auditor reviewing an organization's method to transport sensitive data between offices should be the use of asymmetric encryption algorithms. Asymmetric encryption algorithms are a type of encryption that uses two different keys, one public and one private, to encrypt and decrypt data. The public key is used to encrypt the data and the private key is used to decrypt it. This system is more secure than other methods, such as 128-bit encryption, as it ensures that only the sender and receiver of the data are able to access the data. However, this system can be vulnerable to attacks if the keys are not properly secured.


Contribute your Thoughts:

0/2000 characters
Tora
3 months ago
I think PKI should be part of a broader strategy, not the only method.
upvoted 0 times
...
Oliva
3 months ago
Digital signatures alone won't protect the data in transit.
upvoted 0 times
...
Margo
3 months ago
Wait, 128-bit encryption? Isn't that kinda outdated?
upvoted 0 times
...
Hermila
4 months ago
Totally agree, asymmetric encryption is way more secure!
upvoted 0 times
...
Filiberto
4 months ago
PKI is great, but relying on it exclusively can be risky.
upvoted 0 times
...
James
4 months ago
128-bit encryption seems outdated now, right? I feel like that should definitely be a concern, especially with today's standards.
upvoted 0 times
...
Tran
4 months ago
Asymmetric encryption sounds strong, but I wonder if there are vulnerabilities if it's used alone. I think I saw a similar question about encryption methods in our practice tests.
upvoted 0 times
...
Elke
4 months ago
I think digital signatures are important, but relying on them exclusively might not cover all security aspects. I feel like this could be a trap in the question.
upvoted 0 times
...
Nichelle
5 months ago
I remember discussing PKI in class, but I'm not sure if it's the biggest concern. It seems like it could be secure if implemented correctly.
upvoted 0 times
...
Josefa
5 months ago
I feel confident I know the right answer, but I'll double-check my understanding just to be sure.
upvoted 0 times
...
Tayna
5 months ago
Public key infrastructure is a common way to secure data, but I wonder if there are other factors I should be considering here.
upvoted 0 times
...
Ayesha
5 months ago
Hmm, I'm not sure about the differences between these encryption methods. I'll need to think this through carefully.
upvoted 0 times
...
Roselle
5 months ago
This question seems straightforward, I think I can handle it.
upvoted 0 times
...
Maxima
5 months ago
Okay, let me break this down step-by-step. I need to consider the security implications of each option.
upvoted 0 times
...
Laurel
5 months ago
Okay, let me see. The question is asking where the administrator can pull questions from for the new questionnaire. I'm leaning towards C, but I want to double-check the other options just to be sure.
upvoted 0 times
...
Malcolm
5 months ago
Alright, time to put my MPLS expertise to the test. I've got a good feeling about this one, but I'll double-check my work to be sure.
upvoted 0 times
...
Leonida
2 years ago
128-bit encryption? Psh, I encrypt my grocery list with 256-bit. Gotta go big or go home with sensitive data.
upvoted 0 times
Freeman
2 years ago
Nidia: 128-bit encryption? Psh, I encrypt my grocery list with 256-bit. Gotta go big or go home with sensitive data.
upvoted 0 times
...
Bulah
2 years ago
D) The method relies exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
Nidia
2 years ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Bobbye
2 years ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
...
Lai
2 years ago
Asymmetric encryption? Sounds like a fancy way to say 'not secure enough' for sensitive data.
upvoted 0 times
...
Thea
2 years ago
Digital signatures are great, but they won't stop someone from intercepting the data. Need more layers of security.
upvoted 0 times
Donette
1 year ago
C) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Veronika
1 year ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Hannah
1 year ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
Quentin
1 year ago
C) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Dong
1 year ago
B) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Shaun
2 years ago
A) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
...
Malcom
2 years ago
I see both points, but I think the method relying exclusively on the use of asymmetric encryption algorithms could also be a concern.
upvoted 0 times
...
Zana
2 years ago
I disagree, I believe the greatest concern should be the method relying exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Margurite
2 years ago
I think the greatest concern should be the method relying exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
Carole
2 years ago
Using only PKI? That's like trying to catch a fish with a spoon. Not a good idea for sensitive data transport.
upvoted 0 times
Felix
2 years ago
D) The method relies exclusively on the use of 128-bit encryption.
upvoted 0 times
...
Jenise
2 years ago
C) The method relies exclusively on the use of asymmetric encryption algorithms.
upvoted 0 times
...
Jarod
2 years ago
B) The method relies exclusively on the use of digital signatures.
upvoted 0 times
...
Armando
2 years ago
A) The method relies exclusively on the use of public key infrastructure (PKI).
upvoted 0 times
...
...

Save Cancel