New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Go to page:
Question # 9

Which of the following includes step-by-step directions for accomplishing a specific task?

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Full Access
Question # 10

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Full Access
Question # 11

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Full Access
Question # 12

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle

Full Access
Question # 13

Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?

A.

To create appropriate security awareness content to avoid recurrence

B.

To determine the impact of the intrusion event

C.

To perform a root cause analysis of the intrusion event

D.

To determine and correct any system weaknesses

Full Access
Question # 14

The integrity of digital assets can be controlled by:

A.

read access restrictions, database normalization, and patching.

B.

redundancy, backups, and business continuity management.

C.

access controls, encryption, and digital signatures.

D.

user awareness training and related end-user testing.

Full Access
Question # 15

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

A.

Detect

B.

Identify

C.

Recover

D.

Respond

Full Access
Question # 16

Which of the following is the MOST important consideration when choosing between different types of cloud services?

A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Full Access
Go to page: