New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Go to page:
Question # 33

Which of the following is EASIEST for a malicious attacker to detect?

A.

Use of insufficient cryptography

B.

Insecure storage of sensitive data

C.

Susceptibility to reverse engineering

D.

Ability to tamper with mobile code

Full Access
Question # 34

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Full Access
Question # 35

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Full Access
Question # 36

Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

A.

Packet filters

B.

Analyzers

C.

Administration modules

D.

Sensors

Full Access
Question # 37

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?

A.

Intrusion detection

B.

Stateful inspection

C.

Host-based

D.

Web application

Full Access
Question # 38

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Full Access
Question # 39

Which of the following is a team created PRIMARILY to improve the security posture of an organization?

A.

Computer emergency response team (CERT)

B.

Security operations center (SOC) team

C.

Disaster recovery team

D.

Risk management team

Full Access
Question # 40

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Full Access
Go to page: