Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

Cybersecurity-Audit-Certificate Sample Questions Answers

Questions 4

Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?

Options:

A.

Cybersecurity audit

B.

Financial audit

C.

Forensics audit

D.

Cyber insurance audit

Buy Now
Questions 5

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

Options:

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle

Buy Now
Questions 6

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

Options:

A.

Sandboxing

B.

Whitelisting

C.

URL filtering

D.

File integrity

Buy Now
Questions 7

One way to control the integrity of digital assets is through the use of:

Options:

A.

policies.

B.

frameworks.

C.

caching

D.

hashing.

Buy Now
Questions 8

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

Options:

A.

Processes are approved by the process owner.

B.

Processes are aligned with industry best practices.

C.

Processes are centralized and standardized.

D.

Processes are updated and documented annually.

Buy Now
Questions 9

Which of the following is the PRIMARY goal of implementing a change management process?

Options:

A.

To ensure changes are communicated to the process owners prior to going live

B.

To minimize disruptions to the business from system changes

C.

To ensure that changes made to a system are performed on schedule

D.

To validate that changes to the system provide the expected return on investment

Buy Now
Questions 10

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?

Options:

A.

Ensure the emails are encrypted and provide nonrepudiation.

B.

Provide a backup of emails in the event of a disaster

C.

isolate the emails and test for malicious content

D.

Guarantee rapid email delivery through firewalls.

Buy Now
Questions 11

The integrity of digital assets can be controlled by:

Options:

A.

read access restrictions, database normalization, and patching.

B.

redundancy, backups, and business continuity management.

C.

access controls, encryption, and digital signatures.

D.

user awareness training and related end-user testing.

Buy Now
Questions 12

What is the MAIN consideration when storing backup files?

Options:

A.

Utilizing solid slate device (SSDJ media for quick recovery

B.

Storing backup files on public cloud storage

C.

Protecting the off-site data backup copies from unauthorized access

D.

Storing copies on-site for ease of access during incident response

Buy Now
Questions 13

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?

Options:

A.

Intrusion detection

B.

Stateful inspection

C.

Host-based

D.

Web application

Buy Now
Questions 14

Which phase typically occurs before containment of an incident?

Options:

A.

Identification

B.

Eradication

C.

Preservation

D.

Recovery

Buy Now
Questions 15

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

Options:

A.

It is difficult to know the applicable regulatory requirements when data is located on another country.

B.

Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.

C.

Providers may be restricted from providing detailed ^formation on their employees.

D.

It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.

Buy Now
Questions 16

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

Options:

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Buy Now
Questions 17

Which process converts extracted information to a format understood by investigators?

Options:

A.

Reporting

B.

Ingestion

C.

imaging

D.

Filtering

Buy Now
Questions 18

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

Options:

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Buy Now
Questions 19

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

Options:

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Buy Now
Questions 20

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Buy Now
Questions 21

When performing a teaming exercise, which team works to integrate the defensive tactics and controls from the defending team with the threats and vulnerabilities found by the attacking team?

Options:

A.

Yellow team

B.

Red team

C.

Purple team

D.

Black team

Buy Now
Questions 22

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Options:

A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Buy Now
Questions 23

What is the MAIN objective of an intrusion detection system (IDS) policy?

Options:

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Buy Now
Questions 24

Which of the following provides an early signal of increasing risk exposures for an organization?

Options:

A.

Key performance indicators

B.

Risk management policies and procedures

C.

Key risk indicators

D.

Capability maturity model integration

Buy Now
Questions 25

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Options:

A.

Use of access controls, file permissions, and encryption

B.

Use of backups and business continuity planning

C.

Use of logging digital signatures, and write protection

D.

Use of the awareness tracing programs and related end-user testing

Buy Now
Questions 26

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

Options:

A.

Frameworks

B.

Guidelines

C.

Basedine

D.

Standards

Buy Now
Questions 27

The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?

Options:

A.

Perform background checks on any users or support with administrator access.

B.

Ensure frequent log monitoring of the administrator by a manager.

C.

Set up multi-factor authentication for privileged accounts.

D.

Require the administrator to create a separate non-privileged user account for user tasks.

Buy Now
Questions 28

At which layer in the open systems interconnection (OSI) model does SSH operate?

Options:

A.

Presentation

B.

Session

C.

Application

D.

Network

Buy Now
Questions 29

Which of the following is the MOST serious consequence of mobile device loss or theft?

Options:

A.

Cost of purchasing replacement devices

B.

Physical damage to devices

C.

Installation of unauthorized applications

D.

Compromise of transient data

Buy Now
Questions 30

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

Options:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Buy Now
Questions 31

Which of the following is the SLOWEST method of restoring data from backup media?

Options:

A.

Monthly backup

B.

Full backup

C.

Differential Backup

D.

Incremental backup

Buy Now
Questions 32

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

Options:

A.

Using open source discovery

B.

Scanning the network perimeter

C.

Social engineering

D.

Crafting counterfeit websites

Buy Now
Questions 33

What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?

Options:

A.

Users may access services over the VPN that are network resource intensive.

B.

Users may store the data in plain text on their mobile devices.

C.

Users may access the corporate network from unauthorized devices.

D.

Users may access services not supported by the VPN.

Buy Now
Questions 34

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

Options:

A.

demit/ and access management (1AM)

B.

Security operations center (SOC)

C.

Security training and awareness

D.

Security information and event management (SEM)

Buy Now
Questions 35

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

Options:

A.

Allocating a significant amount of budget to security investments

B.

Adopting industry security standards and frameworks

C.

Establishing metrics to measure and monitor security performance

D.

Conducting annual security awareness training for all employees

Buy Now
Questions 36

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

Options:

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

Buy Now
Questions 37

Which of the following is EASIEST for a malicious attacker to detect?

Options:

A.

Use of insufficient cryptography

B.

Insecure storage of sensitive data

C.

Susceptibility to reverse engineering

D.

Ability to tamper with mobile code

Buy Now
Questions 38

Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?

Options:

A.

Comparison against information security policy

B.

Review of vulnerability scanning results

C.

Comparison against baseline standards

D.

Verification of user acceptance testing

Buy Now
Questions 39

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

Options:

A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Buy Now
Questions 40

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?

Options:

A.

Remediation efforts are communicated to management

B.

The vulnerability program is formally approved

C.

The vulnerability program is reviewed annually.

D.

Remediation efforts are prioritized.

Buy Now
Exam Code: Cybersecurity-Audit-Certificate
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Sep 18, 2024
Questions: 134
$64  $159.99
$48  $119.99
$40  $99.99
buy now Cybersecurity-Audit-Certificate