Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Cybersecurity-Audit-Certificate Exam Dumps - ISACA Cybersecurity Audit Certificate Exam

Question # 4

Which of the following is an objective of public key infrastructure (PKI)?

A.

Creating the private-public key pair for secure communications

B.

Independently authenticating the validity of the sender's public key

C.

Securely distributing secret keys to the communicating parties

D.

Approving the algorithm to be used during data transmission

Full Access
Question # 5

in key protection/management, access should be aligned with which of the following?

A.

System limitation

B.

Least privilege

C.

Position responsibilities

D.

Role descriptions

Full Access
Question # 6

Which of the following controls BEST ensures a user creates a complex password?

A.

Operating system rules

B.

Multi-factor authentication

C.

Information security awareness

D.

Biometrics

Full Access
Question # 7

During which incident response phase is the incident management team activated?

A.

Recovery

B.

Containment

C.

Eradication

D.

Identification

Full Access
Question # 8

In the context of network communications, what are the two types of attack vectors?

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

Full Access
Question # 9

Which of the following includes step-by-step directions for accomplishing a specific task?

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Full Access
Question # 10

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Full Access
Question # 11

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Full Access
Question # 12

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle

Full Access
Question # 13

Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?

A.

To create appropriate security awareness content to avoid recurrence

B.

To determine the impact of the intrusion event

C.

To perform a root cause analysis of the intrusion event

D.

To determine and correct any system weaknesses

Full Access
Question # 14

The integrity of digital assets can be controlled by:

A.

read access restrictions, database normalization, and patching.

B.

redundancy, backups, and business continuity management.

C.

access controls, encryption, and digital signatures.

D.

user awareness training and related end-user testing.

Full Access
Question # 15

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

A.

Detect

B.

Identify

C.

Recover

D.

Respond

Full Access
Question # 16

Which of the following is the MOST important consideration when choosing between different types of cloud services?

A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Full Access
Question # 17

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Full Access
Question # 18

What is the MAIN consideration when storing backup files?

A.

Utilizing solid slate device (SSDJ media for quick recovery

B.

Storing backup files on public cloud storage

C.

Protecting the off-site data backup copies from unauthorized access

D.

Storing copies on-site for ease of access during incident response

Full Access
Question # 19

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Full Access
Question # 20

Which of the following is MOST effective in detecting unknown malware?

A.

Host-based firewall

B.

Signature-based anti-malware

C.

Regular patching

D.

Heuristic-based anti-malware

Full Access
Question # 21

In public key cryptography, digital signatures are primarily used to;

A.

ensure message integrity.

B.

ensure message accuracy.

C.

prove sender authenticity.

D.

maintain confidentiality.

Full Access
Question # 22

The protection of information from unauthorized access or disclosure is known as:

A.

access control.

B.

cryptograph

C.

media protect on.

D.

confidentiality.

Full Access
Question # 23

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.

tokens stored as plain text in many mobile device applications.

B.

use of data transmission that is not always encrypted.

C.

generic names that mobile devices will accept without verification.

D.

weak authentication protocols in wireless networks.

Full Access
Question # 24

Which type of tools look for anomalies in user behavior?

A.

Rootkit detection tools

B.

Trend/variance-detection tools

C.

Audit reduction tools

D.

Attack-signature-detection tools

Full Access
Question # 25

Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?

A.

Resource pooling

B.

Shared network access

C.

Private network access

D.

Broad network access

Full Access
Question # 26

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Full Access
Question # 27

Which of the following is MOST likely to result in unidentified cybersecurity risks?

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Full Access
Question # 28

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

Full Access
Question # 29

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Full Access
Question # 30

Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?

A.

Risk assessment

B.

Maturity model

C.

Contingency planning

D.

Security assessment

Full Access
Question # 31

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

A.

Diffie-Hellman Key Agreement

B.

Digital Signature Standard

C.

Secret Key Cryptography

D.

Elliptic Curve Cryptography

Full Access
Question # 32

Which of the following is an example of an application security control?

A.

Secure coding

B.

User security awareness training

C.

Security operations center

D.

Intrusion detection

Full Access
Question # 33

Which of the following is EASIEST for a malicious attacker to detect?

A.

Use of insufficient cryptography

B.

Insecure storage of sensitive data

C.

Susceptibility to reverse engineering

D.

Ability to tamper with mobile code

Full Access
Question # 34

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Full Access
Question # 35

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Full Access
Question # 36

Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

A.

Packet filters

B.

Analyzers

C.

Administration modules

D.

Sensors

Full Access
Question # 37

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?

A.

Intrusion detection

B.

Stateful inspection

C.

Host-based

D.

Web application

Full Access
Question # 38

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Full Access
Question # 39

Which of the following is a team created PRIMARILY to improve the security posture of an organization?

A.

Computer emergency response team (CERT)

B.

Security operations center (SOC) team

C.

Disaster recovery team

D.

Risk management team

Full Access
Question # 40

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Full Access