Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

A.

Cybersecurity risk assessment methodology

B.

Encryption algorithms used to encrypt the data

C.

Incident escalation procedures

D.

Physical location of the data

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

A.

Processes are approved by the process owner.

B.

Processes are aligned with industry best practices.

C.

Processes are centralized and standardized.

D.

Processes are updated and documented annually.

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

A.

Capability maturity model integration

B.

Balanced scorecard

C.

60 270042009

D.

COBIT 5

Which of the following is the PRIMARY goal of implementing a change management process?

A.

To ensure changes are communicated to the process owners prior to going live

B.

To minimize disruptions to the business from system changes

C.

To ensure that changes made to a system are performed on schedule

D.

To validate that changes to the system provide the expected return on investment

Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?

A.

It is simple to inject malformed code to compromise data processing.

B.

It is easy to execute command and control of the mobile target.

C.

It is difficult to distinguish malicious activity from legitimate traffic.

D.

There is relative anonymity of network connections outside the organization.

Which of the following is an objective of public key infrastructure (PKI)?

A.

Creating the private-public key pair for secure communications

B.

Independently authenticating the validity of the sender's public key

C.

Securely distributing secret keys to the communicating parties

D.

Approving the algorithm to be used during data transmission

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

At which layer in the open systems interconnection (OSI) model does SSH operate?

A.

Presentation

B.

Session

C.

Application

D.

Network