New Year Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Go to page:
Question # 4

Which of the following is an objective of public key infrastructure (PKI)?

A.

Creating the private-public key pair for secure communications

B.

Independently authenticating the validity of the sender's public key

C.

Securely distributing secret keys to the communicating parties

D.

Approving the algorithm to be used during data transmission

Full Access
Question # 5

in key protection/management, access should be aligned with which of the following?

A.

System limitation

B.

Least privilege

C.

Position responsibilities

D.

Role descriptions

Full Access
Question # 6

Which of the following controls BEST ensures a user creates a complex password?

A.

Operating system rules

B.

Multi-factor authentication

C.

Information security awareness

D.

Biometrics

Full Access
Question # 7

During which incident response phase is the incident management team activated?

A.

Recovery

B.

Containment

C.

Eradication

D.

Identification

Full Access
Question # 8

In the context of network communications, what are the two types of attack vectors?

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

Full Access
Go to page: