Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam

What is the FIRST activity associated with a successful cyber attack?

A.

Exploitation

B.

Reconnaissance

C.

Maintaining a presence

D.

Creating attack tools

During which incident response phase is the incident management team activated?

A.

Recovery

B.

Containment

C.

Eradication

D.

Identification

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?

A.

On-demand self-service

B.

Measured service

C.

Broad network access

D.

Agile service management

What is the PRIMARY benefit of ensuring timely and reliable access to information systems?

A.

Improved data integrity

B.

Consistent reporting functionality

C.

Enhanced identity and access management

D.

Increased data availability

Which of the following includes step-by-step directions for accomplishing a specific task?

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

The most common use of asymmetric algorithms is to:

A.

encrypt bulk data.

B.

encrypt data streams.

C.

distribute symmetric keys.

D.

distribute asymmetric keys.

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

A.

Using open source discovery

B.

Scanning the network perimeter

C.

Social engineering

D.

Crafting counterfeit websites

A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?

A.

No, because the risk management function should be the body that makes risk-related decisions for the organization.

B.

Yes, because the second line of defense is generally on a higher organizational level than the first line.

C.

No, because the risk management's oversight function would potentially lose its ability to objectively monitor and measure the business.

D.

Yes, because this arrangement ensures adequate oversight and enforcement of risk management in the organization.

Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?

A.

Endpoint protection

B.

Intrusion detection system (IDS)

C.

Virtual private network (VPN)

D.

Intrusion prevention system (IPS)

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service