ISACA Cybersecurity Audit Certificate ISACA Cybersecurity Audit Certificate Exam Online Training
ISACA Cybersecurity Audit Certificate Online Training
The questions for Cybersecurity Audit Certificate were last updated at Nov 26,2024.
- Exam Code: Cybersecurity Audit Certificate
- Exam Name: ISACA Cybersecurity Audit Certificate Exam
- Certification Provider: ISACA
- Latest update: Nov 26,2024
Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?
- A . Capability maturity model integration
- B . Balanced scorecard
- C . 60 270042009
- D . COBIT 5
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
- A . Backups of information are regularly tested.
- B . Data backups are available onsite for recovery.
- C . The recovery plan is executed during or after an event
- D . full data backup is performed daily.
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
- A . Evaluation of implementation details
- B . Hands-on testing
- C . Hand-based shakeout
- D . Inventory and discovery
Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?
- A . Remediation efforts are communicated to management
- B . The vulnerability program is formally approved
- C . The vulnerability program is reviewed annually.
- D . Remediation efforts are prioritized.
Which of the following backup procedure would only copy files that have changed since the last backup was made?
- A . Incremental backup
- B . Daily backup
- C . Differential backup
- D . Full backup
An information security procedure indicates a requirement to sandbox emails.
What does this requirement mean?
- A . Ensure the emails are encrypted and provide nonrepudiation.
- B . Provide a backup of emails in the event of a disaster
- C . isolate the emails and test for malicious content
- D . Guarantee rapid email delivery through firewalls.
Which of the following features of continuous auditing provides the BEST level of assurance over
traditional sampling?
- A . Reports can be generated more frequently for management.
- B . Automated tools provide more reliability than an auditors personal judgment
- C . Voluminous dale can be analyzed at a high speed to show relevant patterns.
- D . Continuous auditing tools are less complex for auditors to manage.
Which process converts extracted information to a format understood by investigators?
- A . Reporting
- B . Ingestion
- C . imaging
- D . Filtering
in key protection/management, access should be aligned with which of the following?
- A . System limitation
- B . Least privilege
- C . Position responsibilities
- D . Role descriptions
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?
- A . demit/ and access management (1AM)
- B . Security operations center (SOC)
- C . Security training and awareness
- D . Security information and event management (SEM)