ISACA Cybersecurity Audit Certificate ISACA Cybersecurity Audit Certificate Exam Online Training
ISACA Cybersecurity Audit Certificate Online Training
The questions for Cybersecurity Audit Certificate were last updated at Nov 22,2024.
- Exam Code: Cybersecurity Audit Certificate
- Exam Name: ISACA Cybersecurity Audit Certificate Exam
- Certification Provider: ISACA
- Latest update: Nov 22,2024
Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
- A . VPN
- B . IPsec
- C . SSH
- D . SFTP
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
- A . Evaluation of implementation details
- B . Hands-on testing
- C . Risk-based shakeout
- D . Inventory and discovery
Which of the following is the BEST indication of mature third-party vendor risk management for an organization?
- A . The third party’s security program Mows the organization s security program.
- B . The organization maintains vendor security assessment checklists.
- C . The third party maintains annual assessments of control effectiveness.
- D . The organization’s security program follows the thud party’s security program.
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
- A . Evaluation of implementation details
- B . Hands-on testing
- C . Risk-based shakeout
- D . Inventory and discovery
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
- A . Frameworks
- B . Guidelines
- C . Basedine
- D . Standards
Which of the following is the MOST important step to determine the risks posed to an organization by social media?
- A . Review costs related to the organization’s social media outages.
- B . Review cybersecurity insurance requirements for the organization s social media.
- C . Review the disaster recovery strategy for the organization’s social media.
- D . Review access control processes for the organization’s social media accounts.
The protection of information from unauthorized access or disclosure is known as:
- A . access control.
- B . cryptograph
- C . media protect on.
- D . confidentiality.
Security awareness training is MOST effective against which type of threat?
- A . Command injection
- B . Denial of service
- C . Social engineering
- D . Social injection
A cloud service provider is used to perform analytics on an organization’s sensitive dat
a. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
- A . The service provider
- B . Dependent upon the nature of breath
- C . Dependent upon specific regulatory requirements
- D . The organization
One way to control the integrity of digital assets is through the use of:
- A . policies.
- B . frameworks.
- C . caching
- D . hashing.