Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Isaca Cybersecurity Audit Cybersecurity-Audit-Certificate Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Cybersecurity-Audit-Certificate Premium Access

View all detail and faqs for the Cybersecurity-Audit-Certificate exam


395 Students Passed

92% Average Score

94% Same Questions
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

Options:

A.

data in use.

B.

data redundancy.

C.

data availability.

D.

data at rest.

Questions # 2:

During which incident response phase is evidence obtained and preserved?

Options:

A.

Lessons learned

B.

Containment

C.

Eradication

D.

Recovery

Questions # 3:

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

Options:

A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Questions # 4:

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

Options:

A.

Processes are approved by the process owner.

B.

Processes are aligned with industry best practices.

C.

Processes are centralized and standardized.

D.

Processes are updated and documented annually.

Questions # 5:

Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?

Options:

A.

Intrusion detection system (IDS)

B.

Intrusion prevention system (IPS)

C.

Firewall

D.

Router

Questions # 6:

The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:

Options:

A.

a mapping to multiple control frameworks.

B.

severity rankings for identified deficiencies.

C.

templates of vetted cloud auditing programs.

D.

control specifications prioritized by importance.

Questions # 7:

An insecure wireless connection may expose users to which of the following?

Options:

A.

Tailgating

B.

Shoulder surfing

C.

Eavesdropping

D.

Distributed denial of service

Questions # 8:

Why are security frameworks an important part of a cybersecurity strategy?

Options:

A.

They serve to integrate and guide activities.

B.

They contain the necessary policies and standards.

C.

They provide protection to the organization.

D.

They are required for regulatory compliance.

Questions # 9:

Which of the following continuous auditing tools scans and flags business transactions according to predefined criteria on a real-time basis?

Options:

A.

Vulnerability scanner

B.

Automated governance, risk, and compliance (GRC) tool

C.

Intrusion detection system (IDS)

D.

Real-time antivirus protection tool

Questions # 10:

Which of the following BEST characterizes security mechanisms for mobile devices?

Options:

A.

Easy to control through mobile device management

B.

Comparatively weak relative to workstations

C.

Inadequate for organizational use

D.

Configurable and reliable across device types

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.