New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Go to page:
Question # 17

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Full Access
Question # 18

What is the MAIN consideration when storing backup files?

A.

Utilizing solid slate device (SSDJ media for quick recovery

B.

Storing backup files on public cloud storage

C.

Protecting the off-site data backup copies from unauthorized access

D.

Storing copies on-site for ease of access during incident response

Full Access
Question # 19

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Full Access
Question # 20

Which of the following is MOST effective in detecting unknown malware?

A.

Host-based firewall

B.

Signature-based anti-malware

C.

Regular patching

D.

Heuristic-based anti-malware

Full Access
Question # 21

In public key cryptography, digital signatures are primarily used to;

A.

ensure message integrity.

B.

ensure message accuracy.

C.

prove sender authenticity.

D.

maintain confidentiality.

Full Access
Question # 22

The protection of information from unauthorized access or disclosure is known as:

A.

access control.

B.

cryptograph

C.

media protect on.

D.

confidentiality.

Full Access
Question # 23

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.

tokens stored as plain text in many mobile device applications.

B.

use of data transmission that is not always encrypted.

C.

generic names that mobile devices will accept without verification.

D.

weak authentication protocols in wireless networks.

Full Access
Question # 24

Which type of tools look for anomalies in user behavior?

A.

Rootkit detection tools

B.

Trend/variance-detection tools

C.

Audit reduction tools

D.

Attack-signature-detection tools

Full Access
Go to page: