ExamGecko
Home Home / Isaca / Cybersecurity Audit

Isaca Cybersecurity Audit Practice Test - Questions Answers

Question list
Search
Search

in key protection/management, access should be aligned with which of the following?

A.
System limitation
A.
System limitation
Answers
B.
Least privilege
B.
Least privilege
Answers
C.
Position responsibilities
C.
Position responsibilities
Answers
D.
Role descriptions
D.
Role descriptions
Answers
Suggested answer: B

Explanation:

In key protection/management, access should be aligned with the principle ofleast privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

A.
demit/ and access management (1AM)
A.
demit/ and access management (1AM)
Answers
B.
Security operations center (SOC)
B.
Security operations center (SOC)
Answers
C.
Security training and awareness
C.
Security training and awareness
Answers
D.
Security information and event management (SEM)
D.
Security information and event management (SEM)
Answers
Suggested answer: B

Explanation:

Asecurity operations center (SOC)is a centralized unit that monitors, detects, analyzes, and responds to cyber threats and incidents in real time. A SOC enables continuous identification and mitigation of security threats to an organization by using various tools, processes, and expertise.

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

A.
Malware researchers
A.
Malware researchers
Answers
B.
Hacktivists
B.
Hacktivists
Answers
C.
Cybercriminals
C.
Cybercriminals
Answers
D.
Script kiddies
D.
Script kiddies
Answers
Suggested answer: B

Explanation:

Hacktivistsare politically motivated hackers who target specific individuals or organizations to achieve various ideological ends. They may use various methods such as defacing websites, launching denial-of-service attacks, leaking confidential information, or spreading propaganda to advance their causes or protest against perceived injustices.

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

A.
Malware researchers
A.
Malware researchers
Answers
B.
Hacktivists
B.
Hacktivists
Answers
C.
Cybercriminals
C.
Cybercriminals
Answers
D.
Script kiddies
D.
Script kiddies
Answers
Suggested answer: B

Explanation:

Hacktivistsare politically motivated hackers who target specific individuals or organizations to achieve various ideological ends. They may use various methods such as defacing websites, launching denial-of-service attacks, leaking confidential information, or spreading propaganda to advance their causes or protest against perceived injustices.

Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

A.
Industry-specific security regulator
A.
Industry-specific security regulator
Answers
B.
Cybercrime, hacktism. and espionage
B.
Cybercrime, hacktism. and espionage
Answers
C.
Cybersecurity risk scenarios
C.
Cybersecurity risk scenarios
Answers
D.
Cybersecurity operations management
D.
Cybersecurity operations management
Answers
Suggested answer: B

Explanation:

Cyber threat intelligence aims to research and analyze trends and technical developments in the areas ofcybercrime, hacktivism, and espionage. These are the main sources of malicious cyber activities that pose risks to organizations and individuals. Cyber threat intelligence helps to understand the motivations, capabilities, tactics, techniques, and procedures of various threat actors and groups.

Which of the following is an objective of public key infrastructure (PKI)?

A.
Creating the private-public key pair for secure communications
A.
Creating the private-public key pair for secure communications
Answers
B.
Independently authenticating the validity of the sender's public key
B.
Independently authenticating the validity of the sender's public key
Answers
C.
Securely distributing secret keys to the communicating parties
C.
Securely distributing secret keys to the communicating parties
Answers
D.
Approving the algorithm to be used during data transmission
D.
Approving the algorithm to be used during data transmission
Answers
Suggested answer: B

Explanation:

An objective of public key infrastructure (PKI) is to independently authenticate the validity of the sender's public key. PKI is a system that uses cryptographic keys to secure communications and transactions. PKI involves a trusted third party called a certificate authority (CA) that issues digital certificates that link a public key with an identity. The recipient can use the CA's public key to verify the sender's certificate and public key.

Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?

A.
Diffie-Hellman Key Agreement
A.
Diffie-Hellman Key Agreement
Answers
B.
Digital Signature Standard
B.
Digital Signature Standard
Answers
C.
Secret Key Cryptography
C.
Secret Key Cryptography
Answers
D.
Elliptic Curve Cryptography
D.
Elliptic Curve Cryptography
Answers
Suggested answer: D

Explanation:

Elliptic curve cryptography (ECC)is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit. ECC is based on the mathematical properties of elliptic curves, which are curves that have a special shape that makes them suitable for cryptography. ECC can achieve the same level of security as other public key algorithms with much smaller key sizes, which reduces storage and bandwidth requirements.

Which type of tools look for anomalies in user behavior?

A.
Rootkit detection tools
A.
Rootkit detection tools
Answers
B.
Trend/variance-detection tools
B.
Trend/variance-detection tools
Answers
C.
Audit reduction tools
C.
Audit reduction tools
Answers
D.
Attack-signature-detection tools
D.
Attack-signature-detection tools
Answers
Suggested answer: B

Explanation:

Trend/variance-detection toolsare tools that look for anomalies in user behavior. These tools use statistical methods to establish a baseline of normal user activity and then compare it with current or historical data to identify deviations or outliers. These tools can help to detect unauthorized access, fraud, insider threats, or other malicious activities.

The second line of defense in cybersecurity includes:

A.
conducting organization-wide control self-assessments.
A.
conducting organization-wide control self-assessments.
Answers
B.
risk management monitoring, and measurement of controls.
B.
risk management monitoring, and measurement of controls.
Answers
C.
separate reporting to the audit committee within the organization.
C.
separate reporting to the audit committee within the organization.
Answers
D.
performing attack and breach penetration testing.
D.
performing attack and breach penetration testing.
Answers
Suggested answer: B

Explanation:

The second line of defense in cybersecurity includes risk management monitoring, and measurement of controls. This is because the second line of defense is responsible for ensuring that the first line of defense (the operational managers and staff who own and manage risks) is effectively designed and operating as intended. The second line of defense also provides guidance, oversight, and challenge to the first line of defense. The other options are not part of the second line of defense, but rather belong to the first line of defense (A), the third line of defense C, or an external service provider (D).

Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?

A.
Detect
A.
Detect
Answers
B.
Identify
B.
Identify
Answers
C.
Recover
C.
Recover
Answers
D.
Respond
D.
Respond
Answers
Suggested answer: B

Explanation:

Within the NIST core cybersecurity framework, the identify function is associated with using organizational understanding to minimize risk to systems, assets, and data. This is because the identify function helps organizations to develop an organizational understanding of their cybersecurity risk management posture, as well as the threats, vulnerabilities, and impacts that could affect their business objectives. The other functions are not directly related to using organizational understanding, but rather focus on detecting (A), recovering C, or responding (D) to cybersecurity events.

Total 75 questions
Go to page: of 8