Winter Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Questions 4

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

Options:

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Buy Now
Questions 5

Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?

Options:

A.

Cross-site scripting vulnerability

B.

SQL injection vulnerability

C.

Memory leakage vulnerability

D.

Zero-day vulnerability

Buy Now
Questions 6

Why are security frameworks an important part of a cybersecurity strategy?

Options:

A.

They serve to integrate and guide activities.

B.

They contain the necessary policies and standards.

C.

They provide protection to the organization.

D.

They are required for regulatory compliance.

Buy Now
Questions 7

The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:

Options:

A.

a mapping to multiple control frameworks.

B.

severity rankings for identified deficiencies.

C.

templates of vetted cloud auditing programs.

D.

control specifications prioritized by importance.

Buy Now
Questions 8

The protection of information from unauthorized access or disclosure is known as:

Options:

A.

access control.

B.

cryptograph

C.

media protect on.

D.

confidentiality.

Buy Now
Questions 9

Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?

Options:

A.

Keys change periodically on networks.

B.

Keys are stored in the cloud.

C.

Keys remain unchanged on networks for extended times.

D.

Keys are not retrievable.

Buy Now
Questions 10

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

Options:

A.

On demand self-service

B.

Elasticity

C.

Measured service

D.

Resource pooling

Buy Now
Questions 11

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

Options:

A.

VPN

B.

IPsec

C.

SSH

D.

SFTP

Buy Now
Questions 12

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

Options:

A.

Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.

B.

Review the most recent legal and regulatory audit report conducted by an independent party.

C.

Determine if there is a formal process to review changes in legal and regulatory requirements.

D Obtain a list of relevant legal and regulatory requirements.

Buy Now
Questions 13

During which incident response phase is the incident management team activated?

Options:

A.

Recovery

B.

Containment

C.

Eradication

D.

Identification

Buy Now
Questions 14

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

Options:

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle

Buy Now
Questions 15

The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?

Options:

A.

Data breach

B.

System vulnerabilities

C.

Unauthorized access

D.

Indicator of compromise

Buy Now
Questions 16

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

Options:

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Buy Now
Questions 17

Which of the following is the MOST serious consequence of mobile device loss or theft?

Options:

A.

Cost of purchasing replacement devices

B.

Physical damage to devices

C.

Installation of unauthorized applications

D.

Compromise of transient data

Buy Now
Questions 18

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:

A.

Reports can be generated more frequently for management.

B.

Automated tools provide more reliability than an auditors personal judgment

C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.

D.

Continuous auditing tools are less complex for auditors to manage.

Buy Now
Questions 19

Which of the following injects malicious scripts into a trusted website to infect a target?

Options:

A.

Malicious code

B.

Cross-site scripting

C.

Denial-of-service attack

D.

Structure query language attack

Buy Now
Questions 20

Which type of tools look for anomalies in user behavior?

Options:

A.

Rootkit detection tools

B.

Trend/variance-detection tools

C.

Audit reduction tools

D.

Attack-signature-detection tools

Buy Now
Questions 21

Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?

Options:

A.

Significant investments and specialized security skills are not required.

B.

Enterprises can use the latest technologies to counter threats that are constantly evolving.

C.

SECaaS providers are compliant with specific security requirements and new regulations.

D.

Available security services from providers are affordable to enterprises of all sizes.

Buy Now
Questions 22

Which of the following is a feature of an intrusion detection system (IDS)?

Options:

A.

Intrusion prevention

B.

Automated response

C.

Interface with firewalls

D.

Back doors into applications

Buy Now
Questions 23

Using digital evidence to provide validation that an attack has actually occurred is an example of;

Options:

A.

computer forensic

B.

extraction.

C.

identification.

D.

data acquisition.

Buy Now
Questions 24

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Differential backup

C.

Daily backup

D.

Full backup

Buy Now
Questions 25

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

Options:

A.

Attack

B.

Payload

C.

Vulnerability

D.

Target

Buy Now
Questions 26

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?

Options:

A.

Ingestion

B.

Extraction

C.

Imaging

D.

Filtering

Buy Now
Questions 27

Which phase typically occurs before containment of an incident?

Options:

A.

Identification

B.

Eradication

C.

Preservation

D.

Recovery

Buy Now
Questions 28

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

Options:

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Buy Now
Questions 29

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

Options:

A.

Replication of privileged access and the greater likelihood of physical loss increases risk levels.

B.

The risk associated with mobile devices is less than that of other devices and systems.

C.

The risk associated with mobile devices cannot be mitigated with similar controls for workstations.

D.

The ability to wipe mobile devices and disable connectivity adequately mitigates additional

Buy Now
Questions 30

Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?

Options:

A.

Cybersecurity audit

B.

Financial audit

C.

Forensics audit

D.

Cyber insurance audit

Buy Now
Questions 31

Which of the following includes step-by-step directions for accomplishing a specific task?

Options:

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Buy Now
Questions 32

One way to control the integrity of digital assets is through the use of:

Options:

A.

policies.

B.

hashing.

C.

caching.

D.

frameworks.

Buy Now
Questions 33

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

Options:

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Buy Now
Questions 34

Strong data loss prevention (DLP) solutions help protect information in which of the following states?

Options:

A.

At rest, in transit and in use

B.

Operating system application and database levels

C.

Public restricted, and confidential

D.

Data sent, data received, and data deleted

Buy Now
Questions 35

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Hand-based shakeout

D.

Inventory and discovery

Buy Now
Questions 36

A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?

Options:

A.

No, because the risk management function should be the body that makes risk-related decisions for the organization.

B.

Yes, because the second line of defense is generally on a higher organizational level than the first line.

C.

No, because the risk management's oversight function would potentially lose its ability to objectively monitor and measure the business.

D.

Yes, because this arrangement ensures adequate oversight and enforcement of risk management in the organization.

Buy Now
Questions 37

Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?

Options:

A.

Monitoring service provider performance

B.

Prohibiting the service provider from sub-contracting

C.

Requiring the service provider to purchase insurance

D.

Including a cybersecurity clause in the contract

Buy Now
Questions 38

In the context of network communications, what are the two types of attack vectors?

Options:

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

Buy Now
Questions 39

Which of the following is MOST effective in detecting unknown malware?

Options:

A.

Host-based firewall

B.

Signature-based anti-malware

C.

Regular patching

D.

Heuristic-based anti-malware

Buy Now
Questions 40

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

Options:

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Buy Now
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Nov 15, 2024
Questions: 134

PDF + Testing Engine

$64  $159.99

Testing Engine

$48  $119.99
buy now Cybersecurity-Audit-Certificate testing engine

PDF (Q&A)

$40  $99.99
buy now Cybersecurity-Audit-Certificate pdf