100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CISA Domain 5: Information Asset Protection | 118 questions and comprehensive responses $15.00   Add to cart

Exam (elaborations)

CISA Domain 5: Information Asset Protection | 118 questions and comprehensive responses

 9 views  0 purchase
  • Course
  • CISA Domain 5: Protection of Information Assets
  • Institution
  • CISA Domain 5: Protection Of Information Assets

CISA Domain 5: Information Asset Protection | 118 questions and comprehensive responses

Preview 4 out of 46  pages

  • September 6, 2024
  • 46
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CISA Domain 5: Protection of Information Assets
  • CISA Domain 5: Protection of Information Assets
avatar-seller
codersimon
Match term to definition
1-118 of 118

Select a definition to match it with its term




appropriateness of router settings is to be reviewed during


Give this one a go later!


network security review- includes reviewing router access control lists, port
scanning, internal and external connections to the system

,Best method to remove confidential data from computer storage


Give this one a go later!


hard disk should be demagnetized; this will cause all of the bits to be set to zero,
eliminating any chance of retrieving information that was previously stored on the
disk.




Open systems interconnection model


Give this one a go later!


conceptual model that characterizes and standardizes the communication
functions of a telecommunication or computing system without regard to its
underlying internal structure and technology




Digital signature


Give this one a go later!


is a process wherein a digital code is attached to an electronically transmitted
document to verify its contents and the senders identity.
steps:
1) creating hash values of given message
2) encrypting of above hash

,Which is the most important objective of data protection


Give this one a go later!


ensuring the confidentiality and integrity of information. Maintaining data
confidentiality and integrity is the most important objective of data security. This is
a basic requirement if an organization is to continue as a viable and successful
enterprise.




During an audit of a bank, the auditor is assessing whether the enterprise properly manages
staff member access to the operating system. The auditor should determine whether the
enterprise performs: periodic review of the user activity logs


Give this one a go later!


general operating system access control functions include logging user activities,
events, etc. Reviewing these logs may identify users performing activites that
should not be permitted.
- Think of what answer would be applicable to access of the operating system




Which is the most critical function of a firewall


Give this one a go later!

, device used to connect authorized users to trusted network resources. Main and
critical function of a firewall is to prevent unauthorized access to server. A firewall
is a set of related programs that protects the resources of a private network from
other networks.




DBA, data owners, data custodias


Give this one a go later!


The ultimate responsiblity for the data resides with the data owner. They have the
authority and responsibility for granting access to the data and applications for
which they are responsible.


Data custodians - storing and safeguarding the data

DBA - managing the database




Which of the following network components is PRIMARILY set up to serve as a security
measure by preventing unauthorized traffic between different segments of the network:
firewalls


Give this one a go later!


firewall systems are the primary tool that enables an organization to prevent
unauthorized access between networks. An organization may choose to deploy
one or more systems that function as a firewall. primarily deal with authorized
versus unauthoirzed

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller codersimon. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $15.00. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79107 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$15.00
  • (0)
  Add to cart