Pass the Isaca Cybersecurity Audit Cybersecurity-Audit-Certificate Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?

Options:

A.

Least privilege


B.

Information security policy


C.

Encryption


D.

Passwords


Expert Solution
Questions # 12:

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

Options:

A.

Resource contention


B.

Identity spoofing and phishing


C.

Confidentiality, integrity, and availability


D.

Denial of service


Expert Solution
Questions # 13:

Which of the following is EASIEST for a malicious attacker to detect?

Options:

A.

Use of insufficient cryptography


B.

Insecure storage of sensitive data


C.

Susceptibility to reverse engineering


D.

Ability to tamper with mobile code


Expert Solution
Questions # 14:

Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?

Options:

A.

Risk assessment


B.

Maturity model


C.

Contingency planning


D.

Security assessment


Expert Solution
Questions # 15:

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

Options:

A.

Sandboxing


B.

Whitelisting


C.

URL filtering


D.

File integrity


Expert Solution
Questions # 16:

Which of the following is the PRIMARY goal of implementing a change management process?

Options:

A.

To ensure changes are communicated to the process owners prior to going live


B.

To minimize disruptions to the business from system changes


C.

To ensure that changes made to a system are performed on schedule


D.

To validate that changes to the system provide the expected return on investment


Expert Solution
Questions # 17:

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

Options:

A.

Fortified demilitarized zone


B.

Software defined perimeter


C.

Layer 3 virtual private network


D.

Virtual local area network


Expert Solution
Questions # 18:

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Options:

A.

Use of access controls, file permissions, and encryption


B.

Use of backups and business continuity planning


C.

Use of logging digital signatures, and write protection


D.

Use of the awareness tracing programs and related end-user testing


Expert Solution
Questions # 19:

Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?

Options:

A.

To create appropriate security awareness content to avoid recurrence


B.

To determine the impact of the intrusion event


C.

To perform a root cause analysis of the intrusion event


D.

To determine and correct any system weaknesses


Expert Solution
Questions # 20:

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

Options:

A.

Attack


B.

Payload


C.

Vulnerability


D.

Target


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions