Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Questions and Answers
The GREATEST advantage of using a common vulnerability scoring system is that it helps with:
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
At which layer in the open systems interconnection (OSI) model does SSH operate?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:
Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?
Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?
Which of the following continuous auditing tools scans and flags business transactions according to predefined criteria on a real-time basis?
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?
Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?
Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?
Which of the following features of an anti-malware application is MOST helpful in protecting an organization from the potential of infected computers using a virtual private network (VPN)?
Which of the following backup procedures would only copy files that have changed since the last backup was made?
Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Which control mechanism is used to detect the unauthorized modification of key configuration settings?