exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 1044 discussion

Actual exam question from Isaca's CISA
Question #: 1044
Topic #: 1
[All CISA Questions]

A confidential file was sent to a legal entity, and hashing was used on the file. Which type of control has been applied?

  • A. Detective
  • B. Compensating
  • C. Corrective
  • D. Preventive
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
swmasinde
Highly Voted 2 years, 3 months ago
A. Detective
upvoted 6 times
...
52cb16c
Most Recent 3 months, 1 week ago
Selected Answer: A
In the CISA exam criteria, **Hashing** is classified as a "Detective" control, not a "Preventive" control.
upvoted 1 times
...
dencam
5 months ago
Selected Answer: A
Hashing is a detective control because it helps verify data integrity after transmission but does not prevent or correct an issue. It allows the recipient to check if the file was altered but does not stop unauthorized access or modify the data.
upvoted 1 times
...
KAP2HURUF
1 year ago
Selected Answer: A
Hashing doesnt prevent anything
upvoted 2 times
...
marc4354345
1 year, 5 months ago
Selected Answer: A
Hashing does not prevent any change to the file. However it helps to detect such change. Hence A, detective.
upvoted 2 times
...
FAGFUR
1 year, 9 months ago
Selected Answer: D
When hashing is used on a file, it is considered a preventive control. Preventive controls are designed to stop an incident or violation from occurring. In this case, hashing is used to ensure the integrity of the file by generating a hash value (a fixed-size string of characters) based on the content of the file. If the file is altered in any way, the hash value will change, indicating potential tampering. The use of hashing in this context is a preventive measure to help prevent unauthorized changes to the confidential file and maintain its integrity during transmission or storage.
upvoted 3 times
...
3008
1 year, 12 months ago
Selected Answer: D
D is answer. Preventive Control: Controls that proactively block or prevent threats or attacks. For example, security technologies such as firewalls and encryption are preventive controls.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...