New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

Pearson Cybersecurity-Audit-Certificate New Attempt

Page: 6 / 9
Question 24

Strong data loss prevention (DLP) solutions help protect information in which of the following states?

Options:

A.

At rest, in transit and in use

B.

Operating system application and database levels

C.

Public restricted, and confidential

D.

Data sent, data received, and data deleted

Question 25

Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?

Options:

A.

Keys change periodically on networks.

B.

Keys are stored in the cloud.

C.

Keys remain unchanged on networks for extended times.

D.

Keys are not retrievable.

Question 26

Which of the following is a feature of an intrusion detection system (IDS)?

Options:

A.

Intrusion prevention

B.

Automated response

C.

Interface with firewalls

D.

Back doors into applications

Question 27

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Page: 6 / 9
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Dec 22, 2024
Questions: 134
Cybersecurity-Audit-Certificate pdf

Cybersecurity-Audit-Certificate PDF

$25.5  $84.99
Cybersecurity-Audit-Certificate Engine

Cybersecurity-Audit-Certificate Testing Engine

$28.5  $94.99
Cybersecurity-Audit-Certificate PDF + Engine

Cybersecurity-Audit-Certificate PDF + Testing Engine

$40.5  $134.99