Pass the Isaca Cybersecurity Audit Cybersecurity-Audit-Certificate Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

Options:

A.

The service provider


B.

Dependent upon the nature of breath


C.

Dependent upon specific regulatory requirements


D.

The organization


Questions # 2:

The "recover" function of the NISI cybersecurity framework is concerned with:

Options:

A.

planning for resilience and timely repair of compromised capacities and service.


B.

identifying critical data to be recovered m case of a security incident.


C.

taking appropriate action to contain and eradicate a security incident.


D.

allocating costs incurred as part of the implementation of cybersecurity measures.


Questions # 3:

Which of the following is a team created PRIMARILY to improve the security posture of an organization?

Options:

A.

Computer emergency response team (CERT)


B.

Security operations center (SOC) team


C.

Disaster recovery team


D.

Risk management team


Questions # 4:

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:

A.

Reports can be generated more frequently for management.


B.

Automated tools provide more reliability than an auditors personal judgment


C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.


D.

Continuous auditing tools are less complex for auditors to manage.


Questions # 5:

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?

Options:

A.

Intrusion detection


B.

Stateful inspection


C.

Host-based


D.

Web application


Questions # 6:

Which of the following costs are typically covered by cybersecurity insurance?

Options:

A.

Forensic investigation


B.

Threat intelligence feed


C.

SIEM implementation


D.

Reputational loss


Questions # 7:

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

Options:

A.

Incompatibility with cloud service business model


B.

Lack of specificity m the principles


C.

Omission of confidentiality in the criteria


D.

Inability to issue SOC 2 or SOC 3 reports


Questions # 8:

Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?

Options:

A.

It is simple to inject malformed code to compromise data processing.


B.

It is easy to execute command and control of the mobile target.


C.

It is difficult to distinguish malicious activity from legitimate traffic.


D.

There is relative anonymity of network connections outside the organization.


Questions # 9:

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details


B.

Hands-on testing


C.

Risk-based shakeout


D.

Inventory and discovery


Questions # 10:

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

Options:

A.

corporate risk management and assurance strategy.


B.

cybersecurity goals, objectives, and mission.


C.

organizational cybersecurity policies and procedures.


D.

governance, risk management, and compliance.


Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions