楼主: cisamaqing

CISA/CISM认证学习讨论区

[复制链接]
论坛徽章:
0
81#
发表于 2007-3-21 21:35 | 只看该作者

抱歉,上面的帖子发错了

最初由 lixian49 发布
26. The purpose of a follow-up review after an audit is to:

A. Ensure corrective action is achieving desired results
B. Ensure that an auditor gets performance evaluation after each audit
C. Determine if inaccuracies exist in the auditor's assessment
D. Perform compliance testing of selected controls

which one is correct , and Why?

A

使用道具 举报

回复
论坛徽章:
0
82#
发表于 2007-4-7 23:25 | 只看该作者

Re: 抱歉,上面的帖子发错了

最初由 sdlwfangzl 发布
[B]最初由 lixian49 发布
26. The purpose of a follow-up review after an audit is to:

A. Ensure corrective action is achieving desired results
B. Ensure that an auditor gets performance evaluation after each audit
C. Determine if inaccuracies exist in the auditor's assessment
D. Perform compliance testing of selected controls

which one is correct , and Why?

A [/B]


没有W HY的.其他三个是在前面阶段就要决定的.corrective action是个key word

使用道具 举报

回复
论坛徽章:
0
83#
发表于 2007-5-9 14:34 | 只看该作者
An IS auditor should be concerned when a telecommunication analyst:
A. monitors systems performance and tracks problems resulting from program changes.
B. reviews network load requirements in terms of current and future transaction volumes.
C. assesses the impact of the network load on terminal response times and network data transfer rates.
D. recommends network balancing procedures and improvement

answer is B, but why?

使用道具 举报

回复
论坛徽章:
0
84#
发表于 2007-5-12 02:36 | 只看该作者
要向大家学习

使用道具 举报

回复
论坛徽章:
0
85#
发表于 2007-5-14 17:44 | 只看该作者
cyberforensic investigator啥意思呢?

使用道具 举报

回复
论坛徽章:
0
86#
发表于 2007-5-14 21:56 | 只看该作者
DHCP对于非授权访问的风险的增大和减小有关系么?
题目说可以减小.我咋觉得没关系呢

使用道具 举报

回复
论坛徽章:
0
87#
发表于 2007-5-15 19:03 | 只看该作者
请教各位老师一道题目
In a public key infrastructure(PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?
A Nonrepudiation
B Encryption
C Authentication
D Integrity
答案是 A
C为什么不可以呢

使用道具 举报

回复
论坛徽章:
0
88#
发表于 2007-5-16 00:27 | 只看该作者
最初由 sonyorsjtu 发布
[B]请教各位老师一道题目
In a public key infrastructure(PKI), which of the following may be relied upon to prove that an online transaction was authorized by a specific customer?
A Nonrepudiation
B Encryption
C Authentication
D Integrity
答案是 A
C为什么不可以呢 [/B]


nonrepudiation更确切。authentication是交易过程中的动作,比方说网上银行,Client和Server双方都有对对方的authentication。authentication的重点在于验证对方的合法身份,重点不是秋后算账,题目中说到prove,所以选nonrepudiation.

使用道具 举报

回复
论坛徽章:
0
89#
发表于 2007-5-16 21:33 | 只看该作者
To ensure message integrity, confidentiality and nonrepudiation between two parties, the MOST effective method would be to create a message digest by applying a cryptographic hashing algorithm against:

    A. the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key by using the receiver's public key.
    B. any part of the message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the key using the receiver's public key.
    C. the entire message, enciphering the message digest using the sender's private key, enciphering the message with a symmetric key and enciphering the symetric key using the receiver's public key.
    D. the entire message, enciphering the message digest using the sender's private key and enciphering the message using the receiver's public key.

    The correct answer is:
    A

这个AC有啥区别呢

使用道具 举报

回复
论坛徽章:
0
90#
发表于 2007-5-17 15:51 | 只看该作者
最初由 tdoflying 发布
[B]cyberforensic investigator啥意思呢? [/B]



司法调查

使用道具 举报

回复

您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

TOP技术积分榜 社区积分榜 徽章 团队 统计 知识索引树 积分竞拍 文本模式 帮助
  ITPUB首页 | ITPUB论坛 | 数据库技术 | 企业信息化 | 开发技术 | 微软技术 | 软件工程与项目管理 | IBM技术园地 | 行业纵向讨论 | IT招聘 | IT文档
  ChinaUnix | ChinaUnix博客 | ChinaUnix论坛
CopyRight 1999-2011 itpub.net All Right Reserved. 北京盛拓优讯信息技术有限公司版权所有 联系我们 未成年人举报专区 
京ICP备16024965号-8  北京市公安局海淀分局网监中心备案编号:11010802021510 广播电视节目制作经营许可证:编号(京)字第1149号
  
快速回复 返回顶部 返回列表