Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam
Total 134 questions
What is the FIRST activity associated with a successful cyber attack?
During which incident response phase is the incident management team activated?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
Which of the following includes step-by-step directions for accomplishing a specific task?
The most common use of asymmetric algorithms is to:
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?
Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?