Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 4
List of questions
Question 31
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Question 32
Which of the following is the BEST indication that an organization's vulnerability management process is operating effectively?
Question 33
Which of the following backup procedure would only copy files that have changed since the last backup was made?
Question 34
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Question 35
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
Question 36
Which process converts extracted information to a format understood by investigators?
Question 37
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
Question 38
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
Question 39
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
Question 40
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Question