Pre-Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

Cybersecurity-Audit-Certificate Questions and Answers

Question # 6

Which of the following is a feature of an intrusion detection system (IDS)?

A.

Intrusion prevention

B.

Automated response

C.

Interface with firewalls

D.

Back doors into applications

Full Access
Question # 7

In the context of network communications, what are the two types of attack vectors?

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

Full Access
Question # 8

Which of the following includes step-by-step directions for accomplishing a specific task?

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Full Access
Question # 9

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

A.

Backups of information are regularly tested.

B.

Data backups are available onsite for recovery.

C.

The recovery plan is executed during or after an event

D.

full data backup is performed daily.

Full Access
Question # 10

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

A.

Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.

B.

Review the most recent legal and regulatory audit report conducted by an independent party.

C.

Determine if there is a formal process to review changes in legal and regulatory requirements.

D Obtain a list of relevant legal and regulatory requirements.

Full Access
Question # 11

Which of the following is a limitation of intrusion detection systems (IDS)?

A.

Limited evidence on intrusive activity

B.

Application-level vulnerabilities

C.

Lack of Interface with system tools

D.

Weak passwords for the administration console

Full Access
Question # 12

Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?

A.

The mobile device may be subject to remote wipe.

B.

End users are not trained in mobile device management.

C.

The mobile device is not obtained through corporate provisioning.

D.

Privileged access is replicated to the user's own mobile device.

Full Access
Question # 13

Which of the following is an objective of public key infrastructure (PKI)?

A.

Creating the private-public key pair for secure communications

B.

Independently authenticating the validity of the sender's public key

C.

Securely distributing secret keys to the communicating parties

D.

Approving the algorithm to be used during data transmission

Full Access
Question # 14

The second line of defense in cybersecurity includes:

A.

conducting organization-wide control self-assessments.

B.

risk management monitoring, and measurement of controls.

C.

separate reporting to the audit committee within the organization.

D.

performing attack and breach penetration testing.

Full Access
Question # 15

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.

tokens stored as plain text in many mobile device applications.

B.

use of data transmission that is not always encrypted.

C.

generic names that mobile devices will accept without verification.

D.

weak authentication protocols in wireless networks.

Full Access
Question # 16

When passwords are tied into key generation, the strength of the encryption algorithm is:

A.

voided.

B.

increased.

C.

diminished.

D.

maintained.

Full Access
Question # 17

Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

A.

Packet filters

B.

Analyzers

C.

Administration modules

D.

Sensors

Full Access
Question # 18

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Full Access
Question # 19

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Full Access
Question # 20

in key protection/management, access should be aligned with which of the following?

A.

System limitation

B.

Least privilege

C.

Position responsibilities

D.

Role descriptions

Full Access
Question # 21

Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

A.

Industry-specific security regulator

B.

Cybercrime, hacktism. and espionage

C.

Cybersecurity risk scenarios

D.

Cybersecurity operations management

Full Access
Question # 22

Which of the following is the MOST important consideration when choosing between different types of cloud services?

A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Full Access
Question # 23

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

A.

Private hosting

B.

Public hosting

C.

Shared hosting

D.

Hybrid hosting

Full Access
Question # 24

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

A.

Frameworks

B.

Guidelines

C.

Basedine

D.

Standards

Full Access
Question # 25

Which of the following defines the minimum acceptable rules for policy compliance?

A.

Baselines

B.

Guidelines

C.

Standards

D.

Frameworks

Full Access
Question # 26

Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?

A.

Resource pooling

B.

Shared network access

C.

Private network access

D.

Broad network access

Full Access
Question # 27

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?

A.

Ensure the emails are encrypted and provide nonrepudiation.

B.

Provide a backup of emails in the event of a disaster

C.

isolate the emails and test for malicious content

D.

Guarantee rapid email delivery through firewalls.

Full Access
Question # 28

Which of the following is the PRIMARY goal of implementing a change management process?

A.

To ensure changes are communicated to the process owners prior to going live

B.

To minimize disruptions to the business from system changes

C.

To ensure that changes made to a system are performed on schedule

D.

To validate that changes to the system provide the expected return on investment

Full Access
Question # 29

The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?

A.

Data breach

B.

System vulnerabilities

C.

Unauthorized access

D.

Indicator of compromise

Full Access
Question # 30

Which of the following is a feature of a stateful inspection firewall?

A.

It tracks the destination IP address of each packet that leaves the organization's internal network.

B.

It is capable of detecting and blocking sophisticated attacks

C.

It prevents any attack initiated and originated by an insider.

D.

It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.

Full Access
Question # 31

Security awareness training is MOST effective against which type of threat?

A.

Command injection

B.

Denial of service

C.

Social engineering

D.

Social injection

Full Access
Question # 32

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?

A.

Ingestion

B.

Extraction

C.

Imaging

D.

Filtering

Full Access
Question # 33

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Full Access
Question # 34

Which of the following provides an early signal of increasing risk exposures for an organization?

A.

Key performance indicators

B.

Risk management policies and procedures

C.

Key risk indicators

D.

Capability maturity model integration

Full Access
Question # 35

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

A.

Cybersecurity risk assessment methodology

B.

Encryption algorithms used to encrypt the data

C.

Incident escalation procedures

D.

Physical location of the data

Full Access
Question # 36

Which of the following is MOST likely to result in unidentified cybersecurity risks?

A.

Lack of cybersecurity procedures and guidelines

B.

Failure to identify and formalize roles and responsibilities for cybersecurity

C.

Lack of protocols for disclosure of serious cybersecurity breaches to authorities

D.

Failure to establish adequate recovery processes for cybersecurity events

Full Access
Question # 37

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Full Access
Question # 38

What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?

A.

Users may access services over the VPN that are network resource intensive.

B.

Users may store the data in plain text on their mobile devices.

C.

Users may access the corporate network from unauthorized devices.

D.

Users may access services not supported by the VPN.

Full Access
Question # 39

Which of the following backup methods takes the MOST time for restoration of data?

A.

Incremental backup

B.

Offsite backup

C.

Full backup

D.

Differential backup

Full Access
Question # 40

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

A.

Allocating a significant amount of budget to security investments

B.

Adopting industry security standards and frameworks

C.

Establishing metrics to measure and monitor security performance

D.

Conducting annual security awareness training for all employees

Full Access