Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which of the following is the BEST indication of mature third-party vendor risk management for an organization?
Question 22

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Question 23

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Question 24

Which of the following is the MOST important step to determine the risks posed to an organization by social media?
Question 25

The protection of information from unauthorized access or disclosure is known as:
Question 26

Security awareness training is MOST effective against which type of threat?
Question 27

A cloud service provider is used to perform analytics on an organization's sensitive dat
a. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
Question 28

One way to control the integrity of digital assets is through the use of:
Question 29

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?
Question 30

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Question