Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 208 discussion

Actual exam question from Isaca's CISM
Question #: 208
Topic #: 1
[All CISM Questions]

Which of the following is the MOST effective way to protect the authenticity of data in transit?

  • A. Digital signature
  • B. Hash value
  • C. Private key
  • D. Public key
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ATT5832
1 month, 1 week ago
Selected Answer: B
B. Using a hash value, it is possible to ensure the integrity of data. A digital certificate can be used to verify an identity, not the data.
upvoted 1 times
...
Manix
1 year ago
Selected Answer: B
Hash - to ensure data is not modified
upvoted 1 times
SpaceMonkey1
8 months, 3 weeks ago
That's integrity, not authenticity.
upvoted 2 times
...
...
oluchecpoint
1 year, 2 months ago
A. Digital signature. A digital signature is a cryptographic technique that provides both authentication and integrity for data in transit. It ensures that the data has not been tampered with during transmission and that it comes from the expected sender.
upvoted 3 times
...
pc2502
1 year, 3 months ago
data authenticity mean data not altered that means hash value
upvoted 1 times
SpaceMonkey1
8 months, 3 weeks ago
no, that's integrity
upvoted 1 times
...
...
karanvp
1 year, 5 months ago
A is the correct answer. B is wrong as Hash Value is one side encryption which can't be used in Transit.
upvoted 3 times
...
wello
1 year, 5 months ago
Selected Answer: A
Digital Signature
upvoted 2 times
...
richck102
1 year, 5 months ago
A. Digital signature
upvoted 1 times
...
mad68
1 year, 6 months ago
Selected Answer: A
The key phrase is " authenticity of data in transit?"
upvoted 3 times
...
Abhey
1 year, 6 months ago
Selected Answer: A
A. Digital signature is the MOST effective way to protect the authenticity of data in transit. A digital signature is a mathematical technique used to verify the authenticity and integrity of a message, software, or digital document. It uses public key encryption to verify the sender and ensure that the message has not been tampered with during transmission.
upvoted 2 times
...
Gr3yGh0sT
1 year, 7 months ago
The difference between a hash and a digital signature is: Hashes are used to verify the message integrity only, digital signatures are used to verify message authenticity and message integrity.
upvoted 4 times
...
Dravidian
1 year, 7 months ago
Selected Answer: B
Option B - Hash value maintains the integrity which is what the question is point to. All other options protect confidentiality.
upvoted 3 times
Dravidian
1 year, 6 months ago
I have re-evaluated the question and the given option and agree with the others here. It is option A - Digital Signatures. I was under the impression that digital signatures protect confidentiality but turns out it maintains integrity and authenticity.
upvoted 1 times
...
...
Broesweelies
1 year, 10 months ago
Selected Answer: A
The most effective way to protect the authenticity of data in transit is by using a digital signature. A digital signature is a mathematical scheme that uses a private key to ensure the authenticity of the data. It allows the recipient to verify that the data came from the sender and has not been tampered with during transmission. A digital signature provides a high level of security as it uses encryption and authentication techniques to protect the integrity and authenticity of data.
upvoted 4 times
...
MyKasala
1 year, 10 months ago
Selected Answer: A
A is correct
upvoted 3 times
...
prpslux
1 year, 10 months ago
Don't mix authenticity with authentication. In my opinion, Authenticity means in this case the data was not changed. So Hash for me is the answer.
upvoted 1 times
...
baranikumar_v
1 year, 10 months ago
A. Digital certificate. Using code-signing certificate the publisher will sign the data(the computed hash value for the data). This will be validated by the recipient who has the public certificate of the trusted publishers/senders. The recipient computes the hash value of the data to see if it matches the one available in the code-signed certificate. If matches, authenticity and integrity is okay
upvoted 3 times
...
DelTrotter
1 year, 11 months ago
Authenticity is established by using digital signature.
upvoted 3 times
...
aokisan
1 year, 11 months ago
Selected Answer: A
authenticity is supported by TLS of digital signature.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...