Weekend Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Cybersecurity-Audit-Certificate Exam Dumps - Isaca Cybersecurity Audit Questions and Answers

Question # 24

What is the FIRST activity associated with a successful cyber attack?

Options:

A.

Exploitation

B.

Reconnaissance

C.

Maintaining a presence

D.

Creating attack tools

Buy Now
Question # 25

Which of the following includes step-by-step directions for accomplishing a specific task?

Options:

A.

Baselines

B.

Guidelines

C.

Procedures

D.

Policies

Buy Now
Question # 26

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

Options:

A.

On demand self-service

B.

Elasticity

C.

Measured service

D.

Resource pooling

Buy Now
Question # 27

Strong data loss prevention (DLP) solutions help protect information in which of the following states?

Options:

A.

At rest, in transit and in use

B.

Operating system application and database levels

C.

Public restricted, and confidential

D.

Data sent, data received, and data deleted

Buy Now
Question # 28

Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?

Options:

A.

Keys change periodically on networks.

B.

Keys are stored in the cloud.

C.

Keys remain unchanged on networks for extended times.

D.

Keys are not retrievable.

Buy Now
Question # 29

Which of the following is a feature of an intrusion detection system (IDS)?

Options:

A.

Intrusion prevention

B.

Automated response

C.

Interface with firewalls

D.

Back doors into applications

Buy Now
Question # 30

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Buy Now
Question # 31

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

Options:

A.

The service provider

B.

Dependent upon the nature of breath

C.

Dependent upon specific regulatory requirements

D.

The organization

Buy Now
Question # 32

Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?

Options:

A.

Unauthorized access may jeopardize data confidentiality, integrity, or availability.

B.

Operations may be adversely affected if data cannot be recovered and restored timely.

C.

Unauthorized use of valid credentials may compromise encrypted data at rest.

D.

An ineffective firewall may fail to identify and block unwanted network traffic.

Buy Now
Question # 33

Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?

Options:

A.

HTTP protected by symmetric encryption

B.

HTTP with an encrypted session via Transport Layer Security

C.

HTTP protected by asymmetric encryption

D.

HTTP with an encrypted session via MD5 or RC4 protocols

Buy Now
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Feb 23, 2025
Questions: 134
Cybersecurity-Audit-Certificate pdf

Cybersecurity-Audit-Certificate PDF

$25.5  $84.99
Cybersecurity-Audit-Certificate Engine

Cybersecurity-Audit-Certificate Testing Engine

$28.5  $94.99
Cybersecurity-Audit-Certificate PDF + Engine

Cybersecurity-Audit-Certificate PDF + Testing Engine

$40.5  $134.99