Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bigdisc65

Isaca Cybersecurity-Audit-Certificate Actual Questions

Page: 8 / 9
Question 32

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Options:

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery

Question 33

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

Options:

A.

Using open source discovery

B.

Scanning the network perimeter

C.

Social engineering

D.

Crafting counterfeit websites

Question 34

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Differential backup

C.

Daily backup

D.

Full backup

Question 35

What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?

Options:

A.

Users may access services over the VPN that are network resource intensive.

B.

Users may store the data in plain text on their mobile devices.

C.

Users may access the corporate network from unauthorized devices.

D.

Users may access services not supported by the VPN.

Page: 8 / 9
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Nov 21, 2024
Questions: 134
Cybersecurity-Audit-Certificate pdf

Cybersecurity-Audit-Certificate PDF

$28  $80
Cybersecurity-Audit-Certificate Engine

Cybersecurity-Audit-Certificate Testing Engine

$33.25  $95
Cybersecurity-Audit-Certificate PDF + Engine

Cybersecurity-Audit-Certificate PDF + Testing Engine

$45.5  $130