New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Go to page:
Question # 25

Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?

A.

Resource pooling

B.

Shared network access

C.

Private network access

D.

Broad network access

Full Access
Question # 26

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Full Access
Question # 27

Which of the following is MOST likely to result in unidentified cybersecurity risks?

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Full Access
Question # 28

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

Full Access
Question # 29

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Full Access
Question # 30

Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?

A.

Risk assessment

B.

Maturity model

C.

Contingency planning

D.

Security assessment

Full Access
Question # 31

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

A.

Diffie-Hellman Key Agreement

B.

Digital Signature Standard

C.

Secret Key Cryptography

D.

Elliptic Curve Cryptography

Full Access
Question # 32

Which of the following is an example of an application security control?

A.

Secure coding

B.

User security awareness training

C.

Security operations center

D.

Intrusion detection

Full Access
Go to page: