ExamGecko
Question list
Search
Search

Related questions











Question 653 - CISA discussion

Report
Export

An organization is concerned with meeting new regulations for protecting data confidentiality and asks an IS auditor to evaluate their procedures for transporting data. Which of the following would BEST support the organization's objectives?

A.
Cryptographic hashes
Answers
A.
Cryptographic hashes
B.
Virtual local area network (VLAN)
Answers
B.
Virtual local area network (VLAN)
C.
Encryption
Answers
C.
Encryption
D.
Dedicated lines
Answers
D.
Dedicated lines
Suggested answer: C

Explanation:

The best option to support the organization's objectives of protecting data confidentiality while transporting data is encryption. Encryption is a process of transforming data into an unreadable form using a secret key or algorithm, so that only authorized parties can access the original data. Encryption protects the confidentiality of data in transit by preventing unauthorized interception, modification, or disclosure of the data. Encryption can also help comply with data privacy and security regulations, such as the GDPR and HIPAA.

The other options are not as effective as encryption in protecting data confidentiality while transporting data. Cryptographic hashes are mathematical functions that generate a fixed-length output from an input, but they do not encrypt the data. Hashes are used to verify the integrity and authenticity of data, but they do not prevent unauthorized access to the data. Virtual local area network (VLAN) is a logical grouping of network devices that share the same broadcast domain, but they do not encrypt the data. VLANs can improve network performance and security by isolating traffic, but they do not protect the data from being intercepted or modified by external attackers. Dedicated lines are physical connections that provide exclusive access to a network or service, but they do not encrypt the data. Dedicated lines can offer higher bandwidth and reliability, but they do not guarantee the confidentiality of the data from being compromised by physical tampering or eavesdropping.

ISACA, CISA Review Manual, 27th Edition, 2019, p.2471

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription2

Data Security and Confidentiality Guidelines - Centers for Disease Control and Prevention3

Information Security | Confidentiality - GeeksforGeeks4

asked 18/09/2024
Gerald Saraci
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first