Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam

Which of the following backup methods takes the MOST time for restoration of data?

A.

Incremental backup

B.

Offsite backup

C.

Full backup

D.

Differential backup

Which of the following BEST characterizes security mechanisms for mobile devices?

A.

Easy to control through mobile device management

B.

Comparatively weak relative to workstations

C.

Inadequate for organizational use

D.

Configurable and reliable across device types

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

What is the MAIN consideration when storing backup files?

A.

Utilizing solid slate device (SSDJ media for quick recovery

B.

Storing backup files on public cloud storage

C.

Protecting the off-site data backup copies from unauthorized access

D.

Storing copies on-site for ease of access during incident response

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

A.

The service provider

B.

Dependent upon the nature of breath

C.

Dependent upon specific regulatory requirements

D.

The organization

The integrity of digital assets can be controlled by:

A.

read access restrictions, database normalization, and patching.

B.

redundancy, backups, and business continuity management.

C.

access controls, encryption, and digital signatures.

D.

user awareness training and related end-user testing.

Which of the following costs are typically covered by cybersecurity insurance?

A.

Forensic investigation

B.

Threat intelligence feed

C.

SIEM implementation

D.

Reputational loss

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:

A.

a mapping to multiple control frameworks.

B.

severity rankings for identified deficiencies.

C.

templates of vetted cloud auditing programs.

D.

control specifications prioritized by importance.

When passwords are tied into key generation, the strength of the encryption algorithm is:

A.

voided.

B.

increased.

C.

diminished.

D.

maintained.