ExamGecko
Home / Isaca / Cybersecurity Audit / List of questions
Ask Question

Isaca Cybersecurity Audit Practice Test - Questions Answers

List of questions

Question 1

Report Export Collapse

in key protection/management, access should be aligned with which of the following?

System limitation
System limitation
Least privilege
Least privilege
Position responsibilities
Position responsibilities
Role descriptions
Role descriptions
Suggested answer: B
Explanation:

In key protection/management, access should be aligned with the principle ofleast privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.

asked 18/09/2024
giancarlo bagnetti srl
42 questions

Question 2

Report Export Collapse

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

demit/ and access management (1AM)
demit/ and access management (1AM)
Security operations center (SOC)
Security operations center (SOC)
Security training and awareness
Security training and awareness
Security information and event management (SEM)
Security information and event management (SEM)
Suggested answer: B
Explanation:

Asecurity operations center (SOC)is a centralized unit that monitors, detects, analyzes, and responds to cyber threats and incidents in real time. A SOC enables continuous identification and mitigation of security threats to an organization by using various tools, processes, and expertise.

asked 18/09/2024
Adish Narayan
38 questions

Question 3

Report Export Collapse

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

Malware researchers
Malware researchers
Hacktivists
Hacktivists
Cybercriminals
Cybercriminals
Script kiddies
Script kiddies
Suggested answer: B
Explanation:

Hacktivistsare politically motivated hackers who target specific individuals or organizations to achieve various ideological ends. They may use various methods such as defacing websites, launching denial-of-service attacks, leaking confidential information, or spreading propaganda to advance their causes or protest against perceived injustices.

asked 18/09/2024
Tu Nguyen
40 questions

Question 4

Report Export Collapse

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

Malware researchers
Malware researchers
Hacktivists
Hacktivists
Cybercriminals
Cybercriminals
Script kiddies
Script kiddies
Suggested answer: B
Explanation:

Hacktivistsare politically motivated hackers who target specific individuals or organizations to achieve various ideological ends. They may use various methods such as defacing websites, launching denial-of-service attacks, leaking confidential information, or spreading propaganda to advance their causes or protest against perceived injustices.

asked 18/09/2024
Jesus De Leon Luis
47 questions

Question 5

Report Export Collapse

Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

Industry-specific security regulator
Industry-specific security regulator
Cybercrime, hacktism. and espionage
Cybercrime, hacktism. and espionage
Cybersecurity risk scenarios
Cybersecurity risk scenarios
Cybersecurity operations management
Cybersecurity operations management
Suggested answer: B
Explanation:

Cyber threat intelligence aims to research and analyze trends and technical developments in the areas ofcybercrime, hacktivism, and espionage. These are the main sources of malicious cyber activities that pose risks to organizations and individuals. Cyber threat intelligence helps to understand the motivations, capabilities, tactics, techniques, and procedures of various threat actors and groups.

asked 18/09/2024
Arvin Lee
39 questions

Question 6

Report Export Collapse

Which of the following is an objective of public key infrastructure (PKI)?

Creating the private-public key pair for secure communications
Creating the private-public key pair for secure communications
Independently authenticating the validity of the sender's public key
Independently authenticating the validity of the sender's public key
Securely distributing secret keys to the communicating parties
Securely distributing secret keys to the communicating parties
Approving the algorithm to be used during data transmission
Approving the algorithm to be used during data transmission
Suggested answer: B
Explanation:

An objective of public key infrastructure (PKI) is to independently authenticate the validity of the sender's public key. PKI is a system that uses cryptographic keys to secure communications and transactions. PKI involves a trusted third party called a certificate authority (CA) that issues digital certificates that link a public key with an identity. The recipient can use the CA's public key to verify the sender's certificate and public key.

asked 18/09/2024
Ian Wilson
45 questions

Question 7

Report Export Collapse

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

Diffie-Hellman Key Agreement
Diffie-Hellman Key Agreement
Digital Signature Standard
Digital Signature Standard
Secret Key Cryptography
Secret Key Cryptography
Elliptic Curve Cryptography
Elliptic Curve Cryptography
Suggested answer: D
Explanation:

Elliptic curve cryptography (ECC)is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit. ECC is based on the mathematical properties of elliptic curves, which are curves that have a special shape that makes them suitable for cryptography. ECC can achieve the same level of security as other public key algorithms with much smaller key sizes, which reduces storage and bandwidth requirements.

asked 18/09/2024
Kees den Dekker
43 questions

Question 8

Report Export Collapse

Which type of tools look for anomalies in user behavior?

Rootkit detection tools
Rootkit detection tools
Trend/variance-detection tools
Trend/variance-detection tools
Audit reduction tools
Audit reduction tools
Attack-signature-detection tools
Attack-signature-detection tools
Suggested answer: B
Explanation:

Trend/variance-detection toolsare tools that look for anomalies in user behavior. These tools use statistical methods to establish a baseline of normal user activity and then compare it with current or historical data to identify deviations or outliers. These tools can help to detect unauthorized access, fraud, insider threats, or other malicious activities.

asked 18/09/2024
Anupam Ojha
41 questions

Question 9

Report Export Collapse

The second line of defense in cybersecurity includes:

conducting organization-wide control self-assessments.
conducting organization-wide control self-assessments.
risk management monitoring, and measurement of controls.
risk management monitoring, and measurement of controls.
separate reporting to the audit committee within the organization.
separate reporting to the audit committee within the organization.
performing attack and breach penetration testing.
performing attack and breach penetration testing.
Suggested answer: B
Explanation:

The second line of defense in cybersecurity includes risk management monitoring, and measurement of controls. This is because the second line of defense is responsible for ensuring that the first line of defense (the operational managers and staff who own and manage risks) is effectively designed and operating as intended. The second line of defense also provides guidance, oversight, and challenge to the first line of defense. The other options are not part of the second line of defense, but rather belong to the first line of defense (A), the third line of defense C, or an external service provider (D).

asked 18/09/2024
Mian Mudasir Bari
40 questions

Question 10

Report Export Collapse

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

Detect
Detect
Identify
Identify
Recover
Recover
Respond
Respond
Suggested answer: B
Explanation:

Within the NIST core cybersecurity framework, the identify function is associated with using organizational understanding to minimize risk to systems, assets, and data. This is because the identify function helps organizations to develop an organizational understanding of their cybersecurity risk management posture, as well as the threats, vulnerabilities, and impacts that could affect their business objectives. The other functions are not directly related to using organizational understanding, but rather focus on detecting (A), recovering C, or responding (D) to cybersecurity events.

asked 18/09/2024
Nicolas GARCIA
34 questions
Total 75 questions
Go to page: of 8