ExamGecko
Question list
Search
Search

Related questions

Question 983 - CISA discussion

Report
Export

Which of the following BEST describes a digital signature?

A.
It is under control of the receiver.
Answers
A.
It is under control of the receiver.
B.
It is capable of authorization.
Answers
B.
It is capable of authorization.
C.
It dynamically validates modifications of data.
Answers
C.
It dynamically validates modifications of data.
D.
It is unique to the sender using it.
Answers
D.
It is unique to the sender using it.
Suggested answer: D

Explanation:

A digital signature is a type of electronic signature that uses cryptographic techniques to provide authentication, integrity, and non-repudiation of digital documents. A digital signature is created by applying a mathematical function (called a hash function) to the document and then encrypting the result with the sender's private key. The encrypted hash, along with the sender's public key and other information, forms the digital signature. The receiver can verify the digital signature by decrypting it with the sender's public key and comparing the hash with the one computed from the document. If they match, it means that the document has not been altered and that it was signed by the owner of the private key.

Option D is correct because a digital signature is unique to the sender using it, as it depends on the sender's private key, which only the sender knows and controls. No one else can create a valid digital signature with the same private key, and no one can forge or modify a digital signature without being detected.

Option A is incorrect because a digital signature is not under control of the receiver, but rather under control of the sender. The receiver can only verify the digital signature, but cannot create or modify it.

Option B is incorrect because a digital signature is not capable of authorization, but rather capable of authentication. Authorization is the process of granting or denying access to resources based on predefined rules or policies. Authentication is the process of verifying the identity or legitimacy of a person or entity. A digital signature can authenticate the sender of a document, but it cannot authorize what actions the receiver can perform on the document.

Option C is incorrect because a digital signature does not dynamically validate modifications of data, but rather statically validates the integrity of data. A digital signature is based on a snapshot of the document at the time of signing, and any subsequent changes to the document will invalidate the digital signature. A digital signature does not monitor or update itself based on data modifications.

CISA Online Review Course1, Module 5: Protection of Information Assets, Lesson 2: Encryption Basics, slide 13-14.

CISA Review Manual (Digital Version)2, Chapter 5: Protection of Information Assets, Section 5.2: Encryption Basics, p. 273-274.

CISA Review Manual (Print Version), Chapter 5: Protection of Information Assets, Section 5.2: Encryption Basics, p. 273-274.

CISA Questions, Answers & Explanations Database3, Question ID: QAE_CISA_712.

What Is a Digital Signature (and How Does it Work)1

What are digital signatures and certificates?2

Digital Signature Definition3

Examples and uses of electronic signatures4

What is an Electronic Signature?5

asked 18/09/2024
Abdulraheem alsaka
30 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first