Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > Isaca > Cybersecurity Audit > Cybersecurity-Audit-Certificate

Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Question and Answers

Question # 4

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

A.

Diffie-Hellman Key Agreement

B.

Digital Signature Standard

C.

Secret Key Cryptography

D.

Elliptic Curve Cryptography

Full Access
Question # 5

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

A.

Incompatibility with cloud service business model

B.

Lack of specificity m the principles

C.

Omission of confidentiality in the criteria

D.

Inability to issue SOC 2 or SOC 3 reports

Full Access
Question # 6

Which of the following injects malicious scripts into a trusted website to infect a target?

A.

Malicious code

B.

Cross-site scripting

C.

Denial-of-service attack

D.

Structure query language attack

Full Access
Question # 7

Which of the following costs are typically covered by cybersecurity insurance?

A.

Forensic investigation

B.

Threat intelligence feed

C.

SIEM implementation

D.

Reputational loss

Full Access
Question # 8

Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

A.

Industry-specific security regulator

B.

Cybercrime, hacktism. and espionage

C.

Cybersecurity risk scenarios

D.

Cybersecurity operations management

Full Access
Question # 9

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Full Access
Question # 10

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

A.

VPN

B.

IPsec

C.

SSH

D.

SFTP

Full Access
Question # 11

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?

A.

Intrusion detection

B.

Stateful inspection

C.

Host-based

D.

Web application

Full Access
Question # 12

Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?

A.

To create appropriate security awareness content to avoid recurrence

B.

To determine the impact of the intrusion event

C.

To perform a root cause analysis of the intrusion event

D.

To determine and correct any system weaknesses

Full Access
Question # 13

When performing a teaming exercise, which team works to integrate the defensive tactics and controls from the defending team with the threats and vulnerabilities found by the attacking team?

A.

Yellow team

B.

Red team

C.

Purple team

D.

Black team

Full Access
Question # 14

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

A.

demit/ and access management (1AM)

B.

Security operations center (SOC)

C.

Security training and awareness

D.

Security information and event management (SEM)

Full Access
Question # 15

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Full Access
Question # 16

Which of the following defines the minimum acceptable rules for policy compliance?

A.

Baselines

B.

Guidelines

C.

Standards

D.

Frameworks

Full Access
Question # 17

Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?

A.

Least privilege

B.

Information security policy

C.

Encryption

D.

Passwords

Full Access
Question # 18

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

A.

On demand self-service

B.

Elasticity

C.

Measured service

D.

Resource pooling

Full Access
Question # 19

Which of the following types of backups requires the MOST time?

A.

Incremental backup

B.

Differential backup

C.

Full backup

D.

Offsite backup

Full Access
Question # 20

Which of the following is a feature of a stateful inspection firewall?

A.

It tracks the destination IP address of each packet that leaves the organization's internal network.

B.

It is capable of detecting and blocking sophisticated attacks

C.

It prevents any attack initiated and originated by an insider.

D.

It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.

Full Access
Question # 21

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

A.

Frameworks

B.

Guidelines

C.

Basedine

D.

Standards

Full Access
Question # 22

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

A.

Capability maturity model integration

B.

Balanced scorecard

C.

60 270042009

D.

COBIT 5

Full Access
Question # 23

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Full Access
Question # 24

Which of the following is an example of an application security control?

A.

Secure coding

B.

User security awareness training

C.

Security operations center

D.

Intrusion detection

Full Access
Question # 25

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.

tokens stored as plain text in many mobile device applications.

B.

use of data transmission that is not always encrypted.

C.

generic names that mobile devices will accept without verification.

D.

weak authentication protocols in wireless networks.

Full Access
Question # 26

What is the FIRST activity associated with a successful cyber attack?

A.

Exploitation

B.

Reconnaissance

C.

Maintaining a presence

D.

Creating attack tools

Full Access
Question # 27

The "recover" function of the NISI cybersecurity framework is concerned with:

A.

planning for resilience and timely repair of compromised capacities and service.

B.

identifying critical data to be recovered m case of a security incident.

C.

taking appropriate action to contain and eradicate a security incident.

D.

allocating costs incurred as part of the implementation of cybersecurity measures.

Full Access
Question # 28

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Full Access
Question # 29

in key protection/management, access should be aligned with which of the following?

A.

System limitation

B.

Least privilege

C.

Position responsibilities

D.

Role descriptions

Full Access
Question # 30

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

A.

Using open source discovery

B.

Scanning the network perimeter

C.

Social engineering

D.

Crafting counterfeit websites

Full Access
Question # 31

During which incident response phase is evidence obtained and preserved?

A.

Lessons learned

B.

Containment

C.

Eradication

D.

Recovery

Full Access
Question # 32

Which of the following is the MOST important consideration when choosing between different types of cloud services?

A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Full Access
Question # 33

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Full Access
Question # 34

Using digital evidence to provide validation that an attack has actually occurred is an example of;

A.

computer forensic

B.

extraction.

C.

identification.

D.

data acquisition.

Full Access
Question # 35

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Full Access
Question # 36

Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?

A.

Risk assessment

B.

Maturity model

C.

Contingency planning

D.

Security assessment

Full Access
Question # 37

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

A.

Fortified demilitarized zone

B.

Software defined perimeter

C.

Layer 3 virtual private network

D.

Virtual local area network

Full Access
Question # 38

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

A.

It is difficult to know the applicable regulatory requirements when data is located on another country.

B.

Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.

C.

Providers may be restricted from providing detailed ^formation on their employees.

D.

It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.

Full Access
Question # 39

Which of the following is EASIEST for a malicious attacker to detect?

A.

Use of insufficient cryptography

B.

Insecure storage of sensitive data

C.

Susceptibility to reverse engineering

D.

Ability to tamper with mobile code

Full Access
Question # 40

Which of the following is a limitation of intrusion detection systems (IDS)?

A.

Limited evidence on intrusive activity

B.

Application-level vulnerabilities

C.

Lack of Interface with system tools

D.

Weak passwords for the administration console

Full Access