Question: 1
During an audit of an enterprise that is dedicated to e-commerce, the IS manager states that digital signatures are used when receiving communications from customers. To substantiate this, an IS auditor must prove that which of the following is used?
Question: 2
When planning an audit of a network setup, an IS auditor should give highest priority to obtaining which of the following network documentation?
Question: 3
Which of the following encrypt/decrypt steps provides the GREATEST assurance of achieving confidentiality, message integrity and nonrepudiation by either sender or recipient?
Question: 4
Use of asymmetric encryption in an internet e-commerce site, where there is one private key for the hosting server and the public key is widely distributed to the customers, is MOST likely to provide comfort to the:
Question: 5
E-mail message authenticity and confidentiality is BEST achieved by signing the message using the:
( A) sender's private key and encrypting the message using the receiver's public key.