Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Cybersecurity Audit Cybersecurity-Audit-Certificate Release Date

Page: 7 / 9
Question 28

A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

Options:

A.

The service provider

B.

Dependent upon the nature of breath

C.

Dependent upon specific regulatory requirements

D.

The organization

Question 29

Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?

Options:

A.

Unauthorized access may jeopardize data confidentiality, integrity, or availability.

B.

Operations may be adversely affected if data cannot be recovered and restored timely.

C.

Unauthorized use of valid credentials may compromise encrypted data at rest.

D.

An ineffective firewall may fail to identify and block unwanted network traffic.

Question 30

Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?

Options:

A.

HTTP protected by symmetric encryption

B.

HTTP with an encrypted session via Transport Layer Security

C.

HTTP protected by asymmetric encryption

D.

HTTP with an encrypted session via MD5 or RC4 protocols

Question 31

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

Options:

A.

Frameworks

B.

Guidelines

C.

Basedine

D.

Standards

Page: 7 / 9
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Dec 3, 2024
Questions: 134
Cybersecurity-Audit-Certificate pdf

Cybersecurity-Audit-Certificate PDF

$29.75  $84.99
Cybersecurity-Audit-Certificate Engine

Cybersecurity-Audit-Certificate Testing Engine

$33.25  $94.99
Cybersecurity-Audit-Certificate PDF + Engine

Cybersecurity-Audit-Certificate PDF + Testing Engine

$47.25  $134.99