Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Questions 4

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?

Options:

A.

Ingestion

B.

Extraction

C.

Imaging

D.

Filtering

Buy Now
Questions 5

Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

Options:

A.

Packet filters

B.

Analyzers

C.

Administration modules

D.

Sensors

Buy Now
Questions 6

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

Options:

A.

Incompatibility with cloud service business model

B.

Lack of specificity m the principles

C.

Omission of confidentiality in the criteria

D.

Inability to issue SOC 2 or SOC 3 reports

Buy Now
Questions 7

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Buy Now
Questions 8

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

Options:

A.

Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.

B.

Review the most recent legal and regulatory audit report conducted by an independent party.

C.

Determine if there is a formal process to review changes in legal and regulatory requirements.

D Obtain a list of relevant legal and regulatory requirements.

Buy Now
Questions 9

Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?

Options:

A.

Endpoint protection

B.

Intrusion detection system (IDS)

C.

Virtual private network (VPN)

D.

Intrusion prevention system (IPS)

Buy Now
Questions 10

The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?

Options:

A.

Data breach

B.

System vulnerabilities

C.

Unauthorized access

D.

Indicator of compromise

Buy Now
Questions 11

Which of the following is a team created PRIMARILY to improve the security posture of an organization?

Options:

A.

Computer emergency response team (CERT)

B.

Security operations center (SOC) team

C.

Disaster recovery team

D.

Risk management team

Buy Now
Questions 12

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Buy Now
Questions 13

Which of the following is an objective of public key infrastructure (PKI)?

Options:

A.

Creating the private-public key pair for secure communications

B.

Independently authenticating the validity of the sender's public key

C.

Securely distributing secret keys to the communicating parties

D.

Approving the algorithm to be used during data transmission

Buy Now
Questions 14

Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?

Options:

A.

To create appropriate security awareness content to avoid recurrence

B.

To determine the impact of the intrusion event

C.

To perform a root cause analysis of the intrusion event

D.

To determine and correct any system weaknesses

Buy Now
Questions 15

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

Options:

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Buy Now
Questions 16

When passwords are tied into key generation, the strength of the encryption algorithm is:

Options:

A.

voided.

B.

increased.

C.

diminished.

D.

maintained.

Buy Now
Questions 17

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

Options:

A.

The service provider

B.

Dependent upon the nature of breath

C.

Dependent upon specific regulatory requirements

D.

The organization

Buy Now
Questions 18

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

Options:

A.

Cybersecurity risk assessment methodology

B.

Encryption algorithms used to encrypt the data

C.

Incident escalation procedures

D.

Physical location of the data

Buy Now
Questions 19

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

Options:

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Buy Now
Questions 20

Which of the following is MOST likely to result in unidentified cybersecurity risks?

Options:

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Buy Now
Questions 21

Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?

Options:

A.

Fluctuating size of form factors for mobile devices

B.

Increasing amount of storage space available on mobile devices

C.

Expanding availability of mobile network coverage

D.

Growing consumer demand for advanced mobile technologies

Buy Now
Questions 22

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

Options:

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Buy Now
Questions 23

What is the MAIN objective of an intrusion detection system (IDS) policy?

Options:

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Buy Now
Questions 24

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

Options:

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Buy Now
Questions 25

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Options:

A.

Use of access controls, file permissions, and encryption

B.

Use of backups and business continuity planning

C.

Use of logging digital signatures, and write protection

D.

Use of the awareness tracing programs and related end-user testing

Buy Now
Questions 26

Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?

Options:

A.

Resource pooling

B.

Shared network access

C.

Private network access

D.

Broad network access

Buy Now
Questions 27

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

Options:

A.

Attack

B.

Payload

C.

Vulnerability

D.

Target

Buy Now
Questions 28

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

Options:

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Buy Now
Questions 29

One way to control the integrity of digital assets is through the use of:

Options:

A.

policies.

B.

hashing.

C.

caching.

D.

frameworks.

Buy Now
Questions 30

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

Options:

A.

Fortified demilitarized zone

B.

Software defined perimeter

C.

Layer 3 virtual private network

D.

Virtual local area network

Buy Now
Questions 31

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

Options:

A.

Allocating a significant amount of budget to security investments

B.

Adopting industry security standards and frameworks

C.

Establishing metrics to measure and monitor security performance

D.

Conducting annual security awareness training for all employees

Buy Now
Questions 32

Which of the following is the MOST important consideration when choosing between different types of cloud services?

Options:

A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Buy Now
Questions 33

At which layer in the open systems interconnection (OSI) model does SSH operate?

Options:

A.

Presentation

B.

Session

C.

Application

D.

Network

Buy Now
Questions 34

In public key cryptography, digital signatures are primarily used to;

Options:

A.

ensure message integrity.

B.

ensure message accuracy.

C.

prove sender authenticity.

D.

maintain confidentiality.

Buy Now
Questions 35

A data loss prevention (DLP) program helps protect an organization from:

Options:

A.

crypto ransomware infection.

B.

unauthorized access to servers and applications.

C.

unauthorized data modification.

D.

exfiltration of sensitive data.

Buy Now
Questions 36

Which of the following backup procedure would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Daily backup

C.

Differential backup

D.

Full backup

Buy Now
Questions 37

Which of the following is the SLOWEST method of restoring data from backup media?

Options:

A.

Monthly backup

B.

Full backup

C.

Differential Backup

D.

Incremental backup

Buy Now
Questions 38

Which of the following is MOST effective in detecting unknown malware?

Options:

A.

Host-based firewall

B.

Signature-based anti-malware

C.

Regular patching

D.

Heuristic-based anti-malware

Buy Now
Questions 39

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

Options:

A.

It is difficult to know the applicable regulatory requirements when data is located on another country.

B.

Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.

C.

Providers may be restricted from providing detailed ^formation on their employees.

D.

It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.

Buy Now
Questions 40

The second line of defense in cybersecurity includes:

Options:

A.

conducting organization-wide control self-assessments.

B.

risk management monitoring, and measurement of controls.

C.

separate reporting to the audit committee within the organization.

D.

performing attack and breach penetration testing.

Buy Now
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: May 7, 2024
Questions: 134
Cybersecurity-Audit-Certificate pdf

Cybersecurity-Audit-Certificate PDF

$28  $80
Cybersecurity-Audit-Certificate Engine

Cybersecurity-Audit-Certificate Testing Engine

$33.25  $95
Cybersecurity-Audit-Certificate PDF + Engine

Cybersecurity-Audit-Certificate PDF + Testing Engine

$45.5  $130