Isaca Cybersecurity Audit Certificate Cybersecurity-Audit-Certificate Exam Questions

Page: 1 / 14
Total 134 questions
Question 1

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?



Answer : C

The feature of continuous auditing that provides the BEST level of assurance over traditional sampling is that voluminous data can be analyzed at a high speed to show relevant patterns. This is because continuous auditing is a technique that uses automated tools and processes to perform audit activities on a continuous or near-real-time basis, and to analyze large amounts of data from various sources and systems. Continuous auditing helps to provide a higher level of assurance than traditional sampling, by covering the entire population of transactions or events, rather than a subset or sample, and by identifying trends, anomalies, or exceptions that may indicate risks or issues. The other options are not features of continuous auditing that provide the best level of assurance over traditional sampling, but rather different aspects or benefits of continuous auditing, such as reporting frequency (A), reliability (B), or complexity (D).


Question 2

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?



Answer : D

Elliptic curve cryptography (ECC)is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit. ECC is based on the mathematical properties of elliptic curves, which are curves that have a special shape that makes them suitable for cryptography. ECC can achieve the same level of security as other public key algorithms with much smaller key sizes, which reduces storage and bandwidth requirements.


Question 3

Which of the following is the MOST serious consequence of mobile device loss or theft?



Answer : D

The MOST serious consequence of mobile device loss or theft is thecompromise of transient data. Transient data is data that is temporarily stored or processed on a mobile device, such as cached data, cookies, browsing history, passwords, or session tokens. Transient data can reveal sensitive information about the user or the organization and can be exploited by attackers to gain access to other systems or networks.


Question 4

Which of the following provides an early signal of increasing risk exposures for an organization?



Answer : C

Key risk indicators (KRIs) are metrics that can provide an early signal of increasing risk exposures for an organization. KRIs are designed to measure and predict potential losses, and they help in identifying trends that could lead to future risks. They are different from Key Performance Indicators (KPIs), which measure the performance related to the achievement of strategic goals. KRIs, on the other hand, are specifically focused on risk and are used to monitor changes in the level of risk exposure.


Question 5

in key protection/management, access should be aligned with which of the following?



Answer : B

In key protection/management, access should be aligned with the principle ofleast privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.


Question 6

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?



Answer : C

An information security procedure that indicates a requirement to sandbox emails means that the emails need to be isolated and tested for malicious content. This is because sandboxing is a technique that creates a virtual or isolated environment, where suspicious or untrusted emails can be executed or analyzed without affecting the rest of the system or network. Sandboxing helps to detect and prevent malware, phishing, or spam attacks that may be embedded in emails, and protect the users and the organization from potential harm. The other options are not what sandboxing emails means, but rather different concepts or techniques that are related to information security, such as encryption and nonrepudiation (A), backup and recovery (B), or firewall and delivery (D).


Question 7

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?



Answer : D

A web application firewall (WAF) is specifically designed to monitor, filter, and block HTTP traffic to and from a web application. It is different from other types of firewalls because it can filter the content of specific web applications. By inspecting HTTP traffic, a WAF can prevent attacks stemming from web application security flaws, such as SQL injection and cross-site scripting (XSS), file inclusion, and security misconfigurations.


Page:    1 / 14   
Total 134 questions