ExamGecko
Question list
Search
Search

Related questions

Question 286 - CISA discussion

Report
Export

Which of the following conditions would be of MOST concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at test?

A.
Short key length
Answers
A.
Short key length
B.
Random key generation
Answers
B.
Random key generation
C.
Use of symmetric encryption
Answers
C.
Use of symmetric encryption
D.
Use of asymmetric encryption
Answers
D.
Use of asymmetric encryption
Suggested answer: A

Explanation:

The condition that would be of most concern to an IS auditor assessing the risk of a successful brute force attack against encrypted data at rest is short key length. A brute force attack is a method of breaking encryption by trying all possible combinations of keys until finding the correct one. The shorter the key length, the easier it is for an attacker to guess or crack the encryption. Random key generation, use of symmetric encryption, and use of asymmetric encryption are not conditions that would increase the risk of a successful brute force attack. In fact, random key generation can enhance security by preventing predictable patterns in key selection. Symmetric encryption and asymmetric encryption are different types of encryption that have their own advantages and disadvantages, but neither is inherently more vulnerable to brute force attacks than the other.Reference:CISA Review Manual (Digital Version): Chapter 5 - Information Systems Operations and Business Resilience

asked 18/09/2024
Krzysztof Dyrdal
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first