ExamGecko
Home Home / Isaca / Cybersecurity Audit

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 2

Question list
Search
Search

The 'recover' function of the NISI cybersecurity framework is concerned with:

A.
planning for resilience and timely repair of compromised capacities and service.
A.
planning for resilience and timely repair of compromised capacities and service.
Answers
B.
identifying critical data to be recovered m case of a security incident.
B.
identifying critical data to be recovered m case of a security incident.
Answers
C.
taking appropriate action to contain and eradicate a security incident.
C.
taking appropriate action to contain and eradicate a security incident.
Answers
D.
allocating costs incurred as part of the implementation of cybersecurity measures.
D.
allocating costs incurred as part of the implementation of cybersecurity measures.
Answers
Suggested answer: A

Explanation:

The ''recover'' function of the NIST cybersecurity framework is concerned with planning for resilience and timely repair of compromised capacities and service. This is because the recover function helps organizations to restore normal operations as quickly as possible after a cybersecurity incident, while also learning from the incident and improving their security posture. The other options are not part of the recover function, but rather belong to the identify (B), respond C, or protect (D) functions.

Availability can be protected through the use of:

A.
user awareness training and related end-user training.
A.
user awareness training and related end-user training.
Answers
B.
access controls. We permissions, and encryption.
B.
access controls. We permissions, and encryption.
Answers
C.
logging, digital signatures, and write protection.
C.
logging, digital signatures, and write protection.
Answers
D.
redundancy, backups, and business continuity management
D.
redundancy, backups, and business continuity management
Answers
Suggested answer: D

Explanation:

Availability can be protected through the use of redundancy, backups, and business continuity management. This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).

Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

A.
Single classification level allocation
A.
Single classification level allocation
Answers
B.
Business process re-engineering
B.
Business process re-engineering
Answers
C.
Business dependency assessment
C.
Business dependency assessment
Answers
D.
Comprehensive cyber insurance procurement
D.
Comprehensive cyber insurance procurement
Answers
Suggested answer: C

Explanation:

The BEST basis for allocating proportional protection activities when comprehensive classification is not feasible is a business dependency assessment. This is because a business dependency assessment helps to identify the criticality and sensitivity of business processes and their supporting assets, based on their contribution to the organization's objectives and value proposition. This allows for prioritizing protection activities according to the level of risk and impact. The other options are not as effective as a business dependency assessment, because they either use a single classification level allocation (A), which does not account for different levels of risk and impact; require a significant amount of time and resources to perform a business process re-engineering (B); or rely on external parties to cover potential losses without reducing the likelihood or impact of incidents (D).

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

A.
Cybersecurity risk assessment methodology
A.
Cybersecurity risk assessment methodology
Answers
B.
Encryption algorithms used to encrypt the data
B.
Encryption algorithms used to encrypt the data
Answers
C.
Incident escalation procedures
C.
Incident escalation procedures
Answers
D.
Physical location of the data
D.
Physical location of the data
Answers
Suggested answer: C

Explanation:

From a regulatory perspective, the MOST important thing for the healthcare organization to determine when outsourcing its patient information processing to a third-party Software as a Service (SaaS) provider is the incident escalation procedures. This is because incident escalation procedures define how security incidents involving patient information are reported, communicated, escalated, and resolved between the healthcare organization and the SaaS provider. This is essential for complying with regulatory requirements such as HIPAA, which mandate timely notification and response to breaches of protected health information. The other options are not as important as incident escalation procedures from a regulatory perspective, because they either relate to technical aspects that may not affect compliance (A, B), or operational aspects that may not affect patient information security (D).

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

A.
Allocating a significant amount of budget to security investments
A.
Allocating a significant amount of budget to security investments
Answers
B.
Adopting industry security standards and frameworks
B.
Adopting industry security standards and frameworks
Answers
C.
Establishing metrics to measure and monitor security performance
C.
Establishing metrics to measure and monitor security performance
Answers
D.
Conducting annual security awareness training for all employees
D.
Conducting annual security awareness training for all employees
Answers
Suggested answer: C

Explanation:

The MOST critical thing to guiding and managing security activities throughout an organization to ensure objectives are met is establishing metrics to measure and monitor security performance. This is because metrics provide quantifiable and objective data that can be used to evaluate the effectiveness and efficiency of security activities, as well as identify gaps and areas for improvement. Metrics also enable communication and reporting of security performance to stakeholders, such as senior management, board members, auditors, regulators, customers, etc. The other options are not as critical as establishing metrics, because they either involve spending money without knowing the return on investment (A), adopting standards without customizing them to fit the organization's context and needs (B), or conducting training without assessing its impact on behavior change (D).

Which of the following is the BEST method of maintaining the confidentiality of digital information?

A.
Use of access controls, file permissions, and encryption
A.
Use of access controls, file permissions, and encryption
Answers
B.
Use of backups and business continuity planning
B.
Use of backups and business continuity planning
Answers
C.
Use of logging digital signatures, and write protection
C.
Use of logging digital signatures, and write protection
Answers
D.
Use of the awareness tracing programs and related end-user testing
D.
Use of the awareness tracing programs and related end-user testing
Answers
Suggested answer: A

Explanation:

The BEST method of maintaining the confidentiality of digital information is using access controls, file permissions, and encryption. This is because these techniques help to prevent unauthorized access, disclosure, or modification of digital information, by restricting who can access the information, what they can do with it, and how they can access it. The other options are not as effective as using access controls, file permissions, and encryption, because they either relate to protecting availability (B), integrity C, or awareness (D).

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

A.
It is difficult to know the applicable regulatory requirements when data is located on another country.
A.
It is difficult to know the applicable regulatory requirements when data is located on another country.
Answers
B.
Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.
B.
Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.
Answers
C.
Providers may be restricted from providing detailed ^formation on their employees.
C.
Providers may be restricted from providing detailed ^formation on their employees.
Answers
D.
It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.
D.
It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.
Answers
Suggested answer: B

Explanation:

The GREATEST challenge to information risk management when outsourcing IT function to a third party is that providers may be reluctant to share technical details on the extent of their information protection mechanisms. This is because providers may consider their information protection mechanisms as proprietary or confidential, or may not want to reveal their weaknesses or vulnerabilities. This makes it difficult for the outsourcing organization to assess the level of security and compliance of the provider, and to monitor and audit their performance. The other options are not as challenging as providers being reluctant to share technical details, because they either involve legal or contractual aspects that can be clarified or negotiated before outsourcing (A, D), or human resource aspects that can be verified or validated by the provider C.

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

A.
risk aggregation.
A.
risk aggregation.
Answers
B.
risk prioritization.
B.
risk prioritization.
Answers
C.
risk elimination.
C.
risk elimination.
Answers
D.
risk quantification
D.
risk quantification
Answers
Suggested answer: B

Explanation:

The GREATEST advantage of using a common vulnerability scoring system is that it helps with risk prioritization. This is because a common vulnerability scoring system provides a standardized and consistent way of measuring and comparing the severity of vulnerabilities, based on their impact and exploitability. This allows organizations to prioritize the remediation of the most critical vulnerabilities and allocate resources accordingly. The other options are not as advantageous as using a common vulnerability scoring system, because they either involve aggregating (A), eliminating C, or quantifying (D) risk, which are not directly related to the scoring system.

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

A.
VPN
A.
VPN
Answers
B.
IPsec
B.
IPsec
Answers
C.
SSH
C.
SSH
Answers
D.
SFTP
D.
SFTP
Answers
Suggested answer: C

Explanation:

The correct answer is C. SSH.

SSH stands for Secure Shell, a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon. SSH allows users to remotely access and execute commands on a server without exposing their credentials or data to eavesdropping, tampering or replay attacks. SSH also supports secure file transfer protocols such as SFTP and SCP1.

VPN stands for Virtual Private Network, a technology that creates a secure, encrypted tunnel between two or more devices over a public network such as the Internet. VPN allows users to access resources on a remote network as if they were physically connected to it, while protecting their privacy and identity2.

IPsec stands for Internet Protocol Security, a set of protocols that provides security at the network layer of the Internet. IPsec supports two modes: transport mode and tunnel mode. Transport mode encrypts only the payload of each packet, while tunnel mode encrypts the entire packet, including the header. IPsec can be used to secure VPN connections, as well as other applications that require data confidentiality, integrity and authentication3.

SFTP stands for Secure File Transfer Protocol, a protocol that uses SSH to securely transfer files between a client and a server over a network. SFTP provides encryption, authentication and compression features to ensure the security and reliability of file transfers.

1: SSH (Secure Shell) 2: What is a VPN? How It Works, Types of VPN | Kaspersky 3: IPsec - Wikipedia : [SFTP - Wikipedia]

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.
Evaluation of implementation details
A.
Evaluation of implementation details
Answers
B.
Hands-on testing
B.
Hands-on testing
Answers
C.
Risk-based shakeout
C.
Risk-based shakeout
Answers
D.
Inventory and discovery
D.
Inventory and discovery
Answers
Suggested answer: D

Explanation:

The FIRST phase of the ISACA framework for auditors reviewing cryptographic environments is inventory and discovery. This is because the inventory and discovery phase helps auditors to identify and document the scope, objectives, and approach of the audit, as well as the cryptographic assets, systems, processes, and stakeholders involved in the cryptographic environment. The inventory and discovery phase also helps auditors to assess the maturity and effectiveness of the cryptographic governance and management within the organization. The other phases are not the first phase of the ISACA framework for auditors reviewing cryptographic environments, but rather follow after the inventory and discovery phase, such as evaluation of implementation details (A), hands-on testing (B), or risk-based shakeout C.

Total 75 questions
Go to page: of 8