ISACA Cybersecurity Audit Certificate ISACA Cybersecurity Audit Certificate Exam Online Training
ISACA Cybersecurity Audit Certificate Online Training
The questions for Cybersecurity Audit Certificate were last updated at Nov 19,2024.
- Exam Code: Cybersecurity Audit Certificate
- Exam Name: ISACA Cybersecurity Audit Certificate Exam
- Certification Provider: ISACA
- Latest update: Nov 19,2024
The second line of defense in cybersecurity includes:
- A . conducting organization-wide control self-assessments.
- B . risk management monitoring, and measurement of controls.
- C . separate reporting to the audit committee within the organization.
- D . performing attack and breach penetration testing.
Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?
- A . Detect
- B . Identify
- C . Recover
- D . Respond
The "recover" function of the NISI cybersecurity framework is concerned with:
- A . planning for resilience and timely repair of compromised capacities and service.
- B . identifying critical data to be recovered m case of a security incident.
- C . taking appropriate action to contain and eradicate a security incident.
- D . allocating costs incurred as part of the implementation of cybersecurity measures.
Availability can be protected through the use of:
- A . user awareness training and related end-user training.
- B . access controls. We permissions, and encryption.
- C . logging, digital signatures, and write protection.
- D . redundancy, backups, and business continuity management
Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?
- A . Single classification level allocation
- B . Business process re-engineering
- C . Business dependency assessment
- D . Comprehensive cyber insurance procurement
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
- A . Cybersecurity risk assessment methodology
- B . Encryption algorithms used to encrypt the data
- C . Incident escalation procedures
- D . Physical location of the data
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?
- A . Allocating a significant amount of budget to security investments
- B . Adopting industry security standards and frameworks
- C . Establishing metrics to measure and monitor security performance
- D . Conducting annual security awareness training for all employees
Which of the following is the BEST method of maintaining the confidentiality of digital information?
- A . Use of access controls, file permissions, and encryption
- B . Use of backups and business continuity planning
- C . Use of logging digital signatures, and write protection
- D . Use of the awareness tracing programs and related end-user testing
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
- A . It is difficult to know the applicable regulatory requirements when data is located on another country.
- B . Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.
- C . Providers may be restricted from providing detailed ^formation on their employees.
- D . It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.
The GREATEST advantage of using a common vulnerability scoring system is that it helps with:
- A . risk aggregation.
- B . risk prioritization.
- C . risk elimination.
- D . risk quantification