ISACA Cybersecurity Audit Certificate ISACA Cybersecurity Audit Certificate Exam Online Training
ISACA Cybersecurity Audit Certificate Online Training
The questions for Cybersecurity Audit Certificate were last updated at Nov 26,2024.
- Exam Code: Cybersecurity Audit Certificate
- Exam Name: ISACA Cybersecurity Audit Certificate Exam
- Certification Provider: ISACA
- Latest update: Nov 26,2024
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
- A . Malware researchers
- B . Hacktivists
- C . Cybercriminals
- D . Script kiddies
What is the PRIMARY purpose of creating a security architecture?
- A . To visually show gaps in information security controls
- B . To create a long-term information security strategy
- C . To map out how security controls interact with an organization’s systems
- D . To provide senior management a measure of information security maturity
Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?
- A . Industry-specific security regulator
- B . Cybercrime, hacktism. and espionage
- C . Cybersecurity risk scenarios
- D . Cybersecurity operations management
Which of the following is an objective of public key infrastructure (PKI)?
- A . Creating the private-public key pair for secure communications
- B . Independently authenticating the validity of the sender’s public key
- C . Securely distributing secret keys to the communicating parties
- D . Approving the algorithm to be used during data transmission
Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?
- A . Diffie-Hellman Key Agreement
- B . Digital Signature Standard
- C . Secret Key Cryptography
- D . Elliptic Curve Cryptography
Which type of tools look for anomalies in user behavior?
- A . Rootkit detection tools
- B . Trend/variance-detection tools
- C . Audit reduction tools
- D . Attack-signature-detection tools
Which of the following is MOST important to verify when reviewing the effectiveness of an organization’s identity management program?
- A . Processes are approved by the process owner.
- B . Processes are aligned with industry best practices.
- C . Processes are centralized and standardized.
- D . Processes are updated and documented annually.
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
- A . common vulnerabilities.
- B . unknown vulnerabilities.
- C . known vulnerabilities.
- D . zero-day vulnerabilities.
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
- A . Using open source discovery
- B . Scanning the network perimeter
- C . Social engineering
- D . Crafting counterfeit websites
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
- A . It is more secure
- B . It is more reliable
- C . It is higher speed.
- D . It is more cost effective.