exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 28 discussion

Actual exam question from Isaca's CISM
Question #: 28
Topic #: 1
[All CISM Questions]

Application data integrity risk is MOST directly addressed by a design that includes.

  • A. strict application of an authorized data dictionary.
  • B. reconciliation routines such as checksums, hash totals, and record counts.
  • C. application log requirements such as field-level audit trails and user activity logs.
  • D. access control technologies such as role-based entitlements.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Noragretz
1 month, 1 week ago
Selected Answer: B
The keyword in the question was integrity. CIA triad, how do you determine integrity and the data hasn’t changed? With hashes and checksums.
upvoted 1 times
...
andyprior
3 months, 1 week ago
Selected Answer: B
Application data integrity risk primarily concerns ensuring that data remains accurate, consistent, and unaltered during storage, processing, or transfer. Reconciliation routines such as checksums, hash totals, and record counts are specifically designed to detect changes or modifications to the data. These methods verify that the data has not been tampered with or corrupted by comparing stored data to its original state.
upvoted 1 times
...
Viperhunter
1 year, 3 months ago
Selected Answer: B
Reconciliation routines, including checksums, hash totals, and record counts, are designed to ensure the accuracy and integrity of application data. These methods help detect errors or unauthorized changes to data by comparing the current state of data with a known or expected state. Reconciliation routines play a crucial role in maintaining data integrity and detecting any discrepancies that may indicate data corruption or tampering. While the other options (strict application of an authorized data dictionary, application log requirements, and access control technologies) are important for various aspects of information security, reconciliation routines directly address the risk of data integrity by providing a means to verify the consistency and accuracy of application data.
upvoted 1 times
...
richck102
1 year, 9 months ago
B. reconciliation routines such as checksums, hash totals, and record counts.
upvoted 1 times
...
Antonivs
2 years, 1 month ago
Selected Answer: B
B, hash always related to integrity
upvoted 1 times
...
Broesweelies
2 years, 1 month ago
Selected Answer: B
Reconciliation routines like checksums, hash totals, and record counts are used to detect any changes or modifications to the data. These routines enable organizations to verify the integrity of their data by comparing the stored data to the original data. This helps to ensure that the data has not been tampered with or altered in any way, which is the primary concern when addressing data integrity risks.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago