Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam
Total 134 questions
During which incident response phase is evidence obtained and preserved?
What is the MAIN objective of an intrusion detection system (IDS) policy?
Which of the following provides an early signal of increasing risk exposures for an organization?
The second line of defense in cybersecurity includes:
Which of the following types of backups requires the MOST time?
The risk of an evil twin attack on mobile devices is PRIMARILY due to:
In the context of network communications, what are the two types of attack vectors?
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?
A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?