Pass the Isaca Cybersecurity Audit Cybersecurity-Audit-Certificate Questions and answers with CertsForce

Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions
Questions # 21:

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

Options:

A.

Cybersecurity risk assessment methodology


B.

Encryption algorithms used to encrypt the data


C.

Incident escalation procedures


D.

Physical location of the data


Expert Solution
Questions # 22:

Which of the following continuous auditing tools scans and flags business transactions according to predefined criteria on a real-time basis?

Options:

A.

Vulnerability scanner


B.

Automated governance, risk, and compliance (GRC) tool


C.

Intrusion detection system (IDS)


D.

Real-time antivirus protection tool


Expert Solution
Questions # 23:

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

Options:

A.

Detect


B.

Identify


C.

Recover


D.

Respond


Expert Solution
Questions # 24:

What is the PRIMARY purpose of creating a security architecture?

Options:

A.

To visually show gaps in information security controls


B.

To create a long-term information security strategy


C.

To map out how security controls interact with an organization's systems


D.

To provide senior management a measure of information security maturity


Expert Solution
Questions # 25:

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?

Options:

A.

Ingestion


B.

Extraction


C.

Imaging


D.

Filtering


Expert Solution
Questions # 26:

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Options:

A.

It is more secure


B.

It is more reliable


C.

It is higher speed.


D.

It is more cost effective.


Expert Solution
Questions # 27:

Which of the following is an objective of public key infrastructure (PKI)?

Options:

A.

Creating the private-public key pair for secure communications


B.

Independently authenticating the validity of the sender's public key


C.

Securely distributing secret keys to the communicating parties


D.

Approving the algorithm to be used during data transmission


Expert Solution
Questions # 28:

A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?

Options:

A.

Brute force


B.

Buffer overflow


C.

Backdoor


D.

Man-in-the-middle


Expert Solution
Questions # 29:

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.


B.

unknown vulnerabilities.


C.

known vulnerabilities.


D.

zero-day vulnerabilities.


Expert Solution
Questions # 30:

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

Options:

A.

Malware researchers


B.

Hacktivists


C.

Cybercriminals


D.

Script kiddies


Expert Solution
Viewing page 3 out of 4 pages
Viewing questions 21-30 out of questions