Pass the Isaca Cybersecurity Audit Cybersecurity-Audit-Certificate Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

Options:

A.

Single classification level allocation


B.

Business process re-engineering


C.

Business dependency assessment


D.

Comprehensive cyber insurance procurement


Expert Solution
Questions # 32:

The second line of defense in cybersecurity includes:

Options:

A.

conducting organization-wide control self-assessments.


B.

risk management monitoring, and measurement of controls.


C.

separate reporting to the audit committee within the organization.


D.

performing attack and breach penetration testing.


Expert Solution
Questions # 33:

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup


B.

Differential backup


C.

Daily backup


D.

Full backup


Expert Solution
Questions # 34:

Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?

Options:

A.

Unauthorized access may jeopardize data confidentiality, integrity, or availability.


B.

Operations may be adversely affected if data cannot be recovered and restored timely.


C.

Unauthorized use of valid credentials may compromise encrypted data at rest.


D.

An ineffective firewall may fail to identify and block unwanted network traffic.


Expert Solution
Questions # 35:

What is the FIRST activity associated with a successful cyber attack?

Options:

A.

Exploitation


B.

Reconnaissance


C.

Maintaining a presence


D.

Creating attack tools


Expert Solution
Questions # 36:

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?

Options:

A.

Remediation efforts are communicated to management


B.

The vulnerability program is formally approved


C.

The vulnerability program is reviewed annually.


D.

Remediation efforts are prioritized.


Expert Solution
Questions # 37:

Which process converts extracted information to a format understood by investigators?

Options:

A.

Reporting


B.

Ingestion


C.

imaging


D.

Filtering


Expert Solution
Questions # 38:

What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?

Options:

A.

Users may access services over the VPN that are network resource intensive.


B.

Users may store the data in plain text on their mobile devices.


C.

Users may access the corporate network from unauthorized devices.


D.

Users may access services not supported by the VPN.


Expert Solution
Questions # 39:

Which of the following provides an early signal of increasing risk exposures for an organization?

Options:

A.

Key performance indicators


B.

Risk management policies and procedures


C.

Key risk indicators


D.

Capability maturity model integration


Expert Solution
Questions # 40:

Which phase typically occurs before containment of an incident?

Options:

A.

Identification


B.

Eradication


C.

Preservation


D.

Recovery


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions