Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam

During which incident response phase is evidence obtained and preserved?

A.

Lessons learned

B.

Containment

C.

Eradication

D.

Recovery

What is the MAIN objective of an intrusion detection system (IDS) policy?

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Which of the following provides an early signal of increasing risk exposures for an organization?

A.

Key performance indicators

B.

Risk management policies and procedures

C.

Key risk indicators

D.

Capability maturity model integration

The second line of defense in cybersecurity includes:

A.

conducting organization-wide control self-assessments.

B.

risk management monitoring, and measurement of controls.

C.

separate reporting to the audit committee within the organization.

D.

performing attack and breach penetration testing.

Which of the following types of backups requires the MOST time?

A.

Incremental backup

B.

Differential backup

C.

Full backup

D.

Offsite backup

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.

tokens stored as plain text in many mobile device applications.

B.

use of data transmission that is not always encrypted.

C.

generic names that mobile devices will accept without verification.

D.

weak authentication protocols in wireless networks.

In the context of network communications, what are the two types of attack vectors?

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

A.

Malware researchers

B.

Hacktivists

C.

Cybercriminals

D.

Script kiddies

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

A.

Private hosting

B.

Public hosting

C.

Shared hosting

D.

Hybrid hosting

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

A.

Brute force

B.

Buffer overflow

C.

Backdoor

D.

Man-in-the-middle