Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Questions 4

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

Options:

A.

risk aggregation.

B.

risk prioritization.

C.

risk elimination.

D.

risk quantification

Buy Now
Questions 5

Availability can be protected through the use of:

Options:

A.

user awareness training and related end-user training.

B.

access controls. We permissions, and encryption.

C.

logging, digital signatures, and write protection.

D.

redundancy, backups, and business continuity management

Buy Now
Questions 6

One way to control the integrity of digital assets is through the use of:

Options:

A.

policies.

B.

hashing.

C.

caching.

D.

frameworks.

Buy Now
Questions 7

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Options:

A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Buy Now
Questions 8

At which layer in the open systems interconnection (OSI) model does SSH operate?

Options:

A.

Presentation

B.

Session

C.

Application

D.

Network

Buy Now
Questions 9

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

Options:

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

Buy Now
Questions 10

The integrity of digital assets can be controlled by:

Options:

A.

read access restrictions, database normalization, and patching.

B.

redundancy, backups, and business continuity management.

C.

access controls, encryption, and digital signatures.

D.

user awareness training and related end-user testing.

Buy Now
Questions 11

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:

A.

Reports can be generated more frequently for management.

B.

Automated tools provide more reliability than an auditors personal judgment

C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.

D.

Continuous auditing tools are less complex for auditors to manage.

Buy Now
Questions 12

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Hand-based shakeout

D.

Inventory and discovery

Buy Now
Questions 13

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

Options:

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Buy Now
Questions 14

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

Options:

A.

Mobile devices

B.

Cloud storage devices

C.

Desktop workstation

D.

Printing devices

Buy Now
Questions 15

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

Options:

A.

Attack

B.

Payload

C.

Vulnerability

D.

Target

Buy Now
Questions 16

Which of the following is MOST important to ensure the successful implementation of continuous auditing?

Options:

A.

Budget for additional storage hardware

B.

Budget for additional technical resources

C.

Top management support

D.

Surplus processing capacity

Buy Now
Questions 17

An insecure wireless connection may expose users to which of the following?

Options:

A.

Tailgating

B.

Shoulder surfing

C.

Eavesdropping

D.

Distributed denial of service

Buy Now
Questions 18

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

Options:

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Buy Now
Questions 19

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

Options:

A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Buy Now
Questions 20

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

Options:

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Buy Now
Questions 21

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

Options:

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Buy Now
Questions 22

What is the FIRST activity associated with a successful cyber attack?

Options:

A.

Exploitation

B.

Reconnaissance

C.

Maintaining a presence

D.

Creating attack tools

Buy Now
Questions 23

Which of the following continuous auditing tools scans and flags business transactions according to predefined criteria on a real-time basis?

Options:

A.

Vulnerability scanner

B.

Automated governance, risk, and compliance (GRC) tool

C.

Intrusion detection system (IDS)

D.

Real-time antivirus protection tool

Buy Now
Questions 24

Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

Options:

A.

Packet filters

B.

Analyzers

C.

Administration modules

D.

Sensors

Buy Now
Questions 25

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?

Options:

A.

An adversary can predict a user's login credentials.

B.

Mobile connectivity could be severely weakened.

C.

A user's behavior pattern can be predicted.

D.

Authorization tokens could be exploited.

Buy Now
Questions 26

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

Options:

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

Buy Now
Questions 27

Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?

Options:

A.

Resource pooling

B.

Shared network access

C.

Private network access

D.

Broad network access

Buy Now
Questions 28

Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?

Options:

A.

Cybersecurity audit

B.

Financial audit

C.

Forensics audit

D.

Cyber insurance audit

Buy Now
Questions 29

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Buy Now
Questions 30

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

Options:

A.

Cybersecurity risk assessment methodology

B.

Encryption algorithms used to encrypt the data

C.

Incident escalation procedures

D.

Physical location of the data

Buy Now
Questions 31

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

Options:

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle

Buy Now
Questions 32

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

Options:

A.

The service provider

B.

Dependent upon the nature of breath

C.

Dependent upon specific regulatory requirements

D.

The organization

Buy Now
Questions 33

Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?

Options:

A.

Fluctuating size of form factors for mobile devices

B.

Increasing amount of storage space available on mobile devices

C.

Expanding availability of mobile network coverage

D.

Growing consumer demand for advanced mobile technologies

Buy Now
Questions 34

Which of the following features of an anti-malware application is MOST helpful in protecting an organization from the potential of infected computers using a virtual private network (VPN)?

Options:

A.

Data heuristics

B.

On-demand scanning

C.

Endpoint remote control

D.

Data packet analysis

Buy Now
Questions 35

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Differential backup

C.

Daily backup

D.

Full backup

Buy Now
Questions 36

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

Options:

A.

Incompatibility with cloud service business model

B.

Lack of specificity m the principles

C.

Omission of confidentiality in the criteria

D.

Inability to issue SOC 2 or SOC 3 reports

Buy Now
Questions 37

The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?

Options:

A.

Perform background checks on any users or support with administrator access.

B.

Ensure frequent log monitoring of the administrator by a manager.

C.

Set up multi-factor authentication for privileged accounts.

D.

Require the administrator to create a separate non-privileged user account for user tasks.

Buy Now
Questions 38

The "recover" function of the NISI cybersecurity framework is concerned with:

Options:

A.

planning for resilience and timely repair of compromised capacities and service.

B.

identifying critical data to be recovered m case of a security incident.

C.

taking appropriate action to contain and eradicate a security incident.

D.

allocating costs incurred as part of the implementation of cybersecurity measures.

Buy Now
Questions 39

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

Options:

A.

Sandboxing

B.

Whitelisting

C.

URL filtering

D.

File integrity

Buy Now
Questions 40

Security awareness training is MOST effective against which type of threat?

Options:

A.

Command injection

B.

Denial of service

C.

Social engineering

D.

Social injection

Buy Now
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Apr 19, 2026
Questions: 134

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99