Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Isaca Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Exam Practice Test

ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Question 1

Which process converts extracted information to a format understood by investigators?

Options:

A.

Reporting

B.

Ingestion

C.

imaging

D.

Filtering

Question 2

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

Options:

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

Question 3

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

Options:

A.

demit/ and access management (1AM)

B.

Security operations center (SOC)

C.

Security training and awareness

D.

Security information and event management (SEM)

Question 4

The "recover" function of the NISI cybersecurity framework is concerned with:

Options:

A.

planning for resilience and timely repair of compromised capacities and service.

B.

identifying critical data to be recovered m case of a security incident.

C.

taking appropriate action to contain and eradicate a security incident.

D.

allocating costs incurred as part of the implementation of cybersecurity measures.

Question 5

The most common use of asymmetric algorithms is to:

Options:

A.

encrypt bulk data.

B.

encrypt data streams.

C.

distribute symmetric keys.

D.

distribute asymmetric keys.

Question 6

Which of the following BEST characterizes security mechanisms for mobile devices?

Options:

A.

Easy to control through mobile device management

B.

Comparatively weak relative to workstations

C.

Inadequate for organizational use

D.

Configurable and reliable across device types

Question 7

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

Options:

A.

Attack

B.

Payload

C.

Vulnerability

D.

Target

Question 8

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Question 9

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:

A.

Reports can be generated more frequently for management.

B.

Automated tools provide more reliability than an auditors personal judgment

C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.

D.

Continuous auditing tools are less complex for auditors to manage.

Question 10

When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?

Options:

A.

Privileged users

B.

Database administrators

C.

Terminated employees

D.

Contractors

Question 11

Which of the following is MOST likely to result in unidentified cybersecurity risks?

Options:

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Question 12

Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?

Options:

A.

Monitoring service provider performance

B.

Prohibiting the service provider from sub-contracting

C.

Requiring the service provider to purchase insurance

D.

Including a cybersecurity clause in the contract

Question 13

Which of the following is the SLOWEST method of restoring data from backup media?

Options:

A.

Monthly backup

B.

Full backup

C.

Differential Backup

D.

Incremental backup

Question 14

Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?

Options:

A.

It is simple to inject malformed code to compromise data processing.

B.

It is easy to execute command and control of the mobile target.

C.

It is difficult to distinguish malicious activity from legitimate traffic.

D.

There is relative anonymity of network connections outside the organization.

Question 15

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

Options:

A.

Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.

B.

Review the most recent legal and regulatory audit report conducted by an independent party.

C.

Determine if there is a formal process to review changes in legal and regulatory requirements.

D Obtain a list of relevant legal and regulatory requirements.

Question 16

Which of the following includes step-by-step directions for accomplishing a specific task?

Options:

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Question 17

What is the PRIMARY benefit of ensuring timely and reliable access to information systems?

Options:

A.

Improved data integrity

B.

Consistent reporting functionality

C.

Enhanced identity and access management

D.

Increased data availability

Question 18

Which of the following defines the minimum acceptable rules for policy compliance?

Options:

A.

Baselines

B.

Guidelines

C.

Standards

D.

Frameworks

Question 19

When passwords are tied into key generation, the strength of the encryption algorithm is:

Options:

A.

voided.

B.

increased.

C.

diminished.

D.

maintained.

Question 20

The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?

Options:

A.

Perform background checks on any users or support with administrator access.

B.

Ensure frequent log monitoring of the administrator by a manager.

C.

Set up multi-factor authentication for privileged accounts.

D.

Require the administrator to create a separate non-privileged user account for user tasks.

Question 21

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

Options:

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Question 22

Which of the following types of backups requires the MOST time?

Options:

A.

Incremental backup

B.

Differential backup

C.

Full backup

D.

Offsite backup

Question 23

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

Options:

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Question 24

Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

Options:

A.

Single classification level allocation

B.

Business process re-engineering

C.

Business dependency assessment

D.

Comprehensive cyber insurance procurement

Question 25

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Question 26

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

Options:

A.

Frameworks

B.

Guidelines

C.

Basedine

D.

Standards

Question 27

Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?

Options:

A.

Cybersecurity audit

B.

Financial audit

C.

Forensics audit

D.

Cyber insurance audit

Question 28

Which phase typically occurs before containment of an incident?

Options:

A.

Identification

B.

Eradication

C.

Preservation

D.

Recovery

Question 29

The "recover" function of the NIST cybersecurity framework is concerned with:

Options:

A.

allocating costs incurred as part of the implementation of cybersecurity measures.

B.

taking appropriate action to contain and eradicate a security incident.

C.

identifying critical data to be recovered in case of a security incident.

D.

planning for resilience and timely repair of compromised capabilities and services.

Question 30

Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?

Options:

A.

HTTP protected by symmetric encryption

B.

HTTP with an encrypted session via Transport Layer Security

C.

HTTP protected by asymmetric encryption

D.

HTTP with an encrypted session via MD5 or RC4 protocols

Question 31

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

Options:

A.

Private hosting

B.

Public hosting

C.

Shared hosting

D.

Hybrid hosting

Question 32

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

Options:

A.

VPN

B.

IPsec

C.

SSH

D.

SFTP

Question 33

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

Options:

A.

Processes are approved by the process owner.

B.

Processes are aligned with industry best practices.

C.

Processes are centralized and standardized.

D.

Processes are updated and documented annually.

Question 34

One way to control the integrity of digital assets is through the use of:

Options:

A.

policies.

B.

hashing.

C.

caching.

D.

frameworks.

Question 35

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Differential backup

C.

Daily backup

D.

Full backup

Question 36

Security awareness training is MOST effective against which type of threat?

Options:

A.

Command injection

B.

Denial of service

C.

Social engineering

D.

Social injection

Question 37

Which of the following is MOST effective in detecting unknown malware?

Options:

A.

Host-based firewall

B.

Signature-based anti-malware

C.

Regular patching

D.

Heuristic-based anti-malware

Question 38

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?

Options:

A.

An adversary can predict a user's login credentials.

B.

Mobile connectivity could be severely weakened.

C.

A user's behavior pattern can be predicted.

D.

Authorization tokens could be exploited.

Question 39

What is the MAIN objective of an intrusion detection system (IDS) policy?

Options:

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Question 40

Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?

Options:

A.

Comparison against information security policy

B.

Review of vulnerability scanning results

C.

Comparison against baseline standards

D.

Verification of user acceptance testing