ISACA Cybersecurity Audit Certificate Exam Questions and Answers
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?
Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following controls BEST ensures a user creates a complex password?
At which layer in the open systems interconnection (OSI) model does SSH operate?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
Which of the following is MOST effective in detecting unknown malware?
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?
Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?
Which of the following backup procedure would only copy files that have changed since the last backup was made?
Which of the following is a team created PRIMARILY to improve the security posture of an organization?
Which phase typically occurs before containment of an incident?
What is the PRIMARY purpose of creating a security architecture?
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
The integrity of digital assets can be controlled by:
Which of the following is commonly referred to as a Wi-Fi hot-spot?
Using digital evidence to provide validation that an attack has actually occurred is an example of;
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
Which of the following is an example of an application security control?
An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?
Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?
Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?
The second line of defense in cybersecurity includes:
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
Which of the following is EASIEST for a malicious attacker to detect?
When passwords are tied into key generation, the strength of the encryption algorithm is:
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
During which incident response phase is the incident management team activated?
A data loss prevention (DLP) program helps protect an organization from: