ExamGecko
Home / Isaca / Cybersecurity Audit / List of questions
Ask Question

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 2

Add to Whishlist

List of questions

Question 11

Report Export Collapse

The 'recover' function of the NISI cybersecurity framework is concerned with:

planning for resilience and timely repair of compromised capacities and service.
planning for resilience and timely repair of compromised capacities and service.
identifying critical data to be recovered m case of a security incident.
identifying critical data to be recovered m case of a security incident.
taking appropriate action to contain and eradicate a security incident.
taking appropriate action to contain and eradicate a security incident.
allocating costs incurred as part of the implementation of cybersecurity measures.
allocating costs incurred as part of the implementation of cybersecurity measures.
Suggested answer: A
Explanation:

The ''recover'' function of the NIST cybersecurity framework is concerned with planning for resilience and timely repair of compromised capacities and service. This is because the recover function helps organizations to restore normal operations as quickly as possible after a cybersecurity incident, while also learning from the incident and improving their security posture. The other options are not part of the recover function, but rather belong to the identify (B), respond C, or protect (D) functions.

asked 18/09/2024
Roberto Recine
53 questions

Question 12

Report Export Collapse

Availability can be protected through the use of:

user awareness training and related end-user training.
user awareness training and related end-user training.
access controls. We permissions, and encryption.
access controls. We permissions, and encryption.
logging, digital signatures, and write protection.
logging, digital signatures, and write protection.
redundancy, backups, and business continuity management
redundancy, backups, and business continuity management
Suggested answer: D
Explanation:

Availability can be protected through the use of redundancy, backups, and business continuity management. This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).

asked 18/09/2024
Mohamed Khazem
30 questions

Question 13

Report Export Collapse

Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

Single classification level allocation
Single classification level allocation
Business process re-engineering
Business process re-engineering
Business dependency assessment
Business dependency assessment
Comprehensive cyber insurance procurement
Comprehensive cyber insurance procurement
Suggested answer: C
Explanation:

The BEST basis for allocating proportional protection activities when comprehensive classification is not feasible is a business dependency assessment. This is because a business dependency assessment helps to identify the criticality and sensitivity of business processes and their supporting assets, based on their contribution to the organization's objectives and value proposition. This allows for prioritizing protection activities according to the level of risk and impact. The other options are not as effective as a business dependency assessment, because they either use a single classification level allocation (A), which does not account for different levels of risk and impact; require a significant amount of time and resources to perform a business process re-engineering (B); or rely on external parties to cover potential losses without reducing the likelihood or impact of incidents (D).

asked 18/09/2024
Arvin Lee
43 questions

Question 14

Report Export Collapse

A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?

Cybersecurity risk assessment methodology
Cybersecurity risk assessment methodology
Encryption algorithms used to encrypt the data
Encryption algorithms used to encrypt the data
Incident escalation procedures
Incident escalation procedures
Physical location of the data
Physical location of the data
Suggested answer: C
Explanation:

From a regulatory perspective, the MOST important thing for the healthcare organization to determine when outsourcing its patient information processing to a third-party Software as a Service (SaaS) provider is the incident escalation procedures. This is because incident escalation procedures define how security incidents involving patient information are reported, communicated, escalated, and resolved between the healthcare organization and the SaaS provider. This is essential for complying with regulatory requirements such as HIPAA, which mandate timely notification and response to breaches of protected health information. The other options are not as important as incident escalation procedures from a regulatory perspective, because they either relate to technical aspects that may not affect compliance (A, B), or operational aspects that may not affect patient information security (D).

asked 18/09/2024
Ferran Ortega Torrabadell
39 questions

Question 15

Report Export Collapse

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

Become a Premium Member for full access
  Unlock Premium Member

Question 16

Report Export Collapse

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Become a Premium Member for full access
  Unlock Premium Member

Question 17

Report Export Collapse

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

Become a Premium Member for full access
  Unlock Premium Member

Question 18

Report Export Collapse

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

Become a Premium Member for full access
  Unlock Premium Member

Question 19

Report Export Collapse

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

Become a Premium Member for full access
  Unlock Premium Member

Question 20

Report Export Collapse

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8