Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 4

List of questions
Question 31

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Question 32

Which of the following is the BEST indication that an organization's vulnerability management process is operating effectively?
Question 33

Which of the following backup procedure would only copy files that have changed since the last backup was made?
Question 34

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Question 35

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
Question 36

Which process converts extracted information to a format understood by investigators?
Question 37

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
Question 38

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
Question 39

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
Question 40

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Question