ExamGecko
Home Home / Isaca / Cybersecurity Audit

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 4

Question list
Search
Search

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.
Evaluation of implementation details
A.
Evaluation of implementation details
Answers
B.
Hands-on testing
B.
Hands-on testing
Answers
C.
Hand-based shakeout
C.
Hand-based shakeout
Answers
D.
Inventory and discovery
D.
Inventory and discovery
Answers
Suggested answer: D

Explanation:

The FIRST phase of the ISACA framework for auditors reviewing cryptographic environments is inventory and discovery. This is because the inventory and discovery phase helps auditors to identify and document the scope, objectives, and approach of the audit, as well as the cryptographic assets, systems, processes, and stakeholders involved in the cryptographic environment. The inventory and discovery phase also helps auditors to assess the maturity and effectiveness of the cryptographic governance and management within the organization. The other phases are not the first phase of the ISACA framework for auditors reviewing cryptographic environments, but rather follow after the inventory and discovery phase, such as evaluation of implementation details (A), hands-on testing (B), or risk-based shakeout C.

Which of the following is the BEST indication that an organization's vulnerability management process is operating effectively?

A.
Remediation efforts are communicated to management
A.
Remediation efforts are communicated to management
Answers
B.
The vulnerability program is formally approved
B.
The vulnerability program is formally approved
Answers
C.
The vulnerability program is reviewed annually.
C.
The vulnerability program is reviewed annually.
Answers
D.
Remediation efforts are prioritized.
D.
Remediation efforts are prioritized.
Answers
Suggested answer: D

Explanation:

The BEST indication that an organization's vulnerability management process is operating effectively is that remediation efforts are prioritized. This is because prioritizing remediation efforts helps to ensure that the most critical and urgent vulnerabilities are addressed first, based on their severity, impact, and exploitability. Prioritizing remediation efforts also helps to optimize the use of resources and time for mitigating vulnerabilities and reducing risks. The other options are not as indicative of an effective vulnerability management process, because they either involve communicating (A), approving (B), or reviewing C aspects that are not directly related to remediating vulnerabilities.

Which of the following backup procedure would only copy files that have changed since the last backup was made?

A.
Incremental backup
A.
Incremental backup
Answers
B.
Daily backup
B.
Daily backup
Answers
C.
Differential backup
C.
Differential backup
Answers
D.
Full backup
D.
Full backup
Answers
Suggested answer: A

Explanation:

The backup procedure that would only copy files that have changed since the last backup was made is an incremental backup. This is because an incremental backup is a type of backup that only copies the files that have been created or modified since the previous backup, whether it was a full or an incremental backup. An incremental backup helps to reduce the backup time and storage space, as well as the recovery time, as only the changed files need to be restored. The other options are not backup procedures that would only copy files that have changed since the last backup was made, but rather different types of backup procedures that copy files based on different criteria, such as daily backup (B), differential backup C, or full backup (D).

An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?

A.
Ensure the emails are encrypted and provide nonrepudiation.
A.
Ensure the emails are encrypted and provide nonrepudiation.
Answers
B.
Provide a backup of emails in the event of a disaster
B.
Provide a backup of emails in the event of a disaster
Answers
C.
isolate the emails and test for malicious content
C.
isolate the emails and test for malicious content
Answers
D.
Guarantee rapid email delivery through firewalls.
D.
Guarantee rapid email delivery through firewalls.
Answers
Suggested answer: C

Explanation:

An information security procedure that indicates a requirement to sandbox emails means that the emails need to be isolated and tested for malicious content. This is because sandboxing is a technique that creates a virtual or isolated environment, where suspicious or untrusted emails can be executed or analyzed without affecting the rest of the system or network. Sandboxing helps to detect and prevent malware, phishing, or spam attacks that may be embedded in emails, and protect the users and the organization from potential harm. The other options are not what sandboxing emails means, but rather different concepts or techniques that are related to information security, such as encryption and nonrepudiation (A), backup and recovery (B), or firewall and delivery (D).

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

A.
Reports can be generated more frequently for management.
A.
Reports can be generated more frequently for management.
Answers
B.
Automated tools provide more reliability than an auditors personal judgment
B.
Automated tools provide more reliability than an auditors personal judgment
Answers
C.
Voluminous dale can be analyzed at a high speed to show relevant patterns.
C.
Voluminous dale can be analyzed at a high speed to show relevant patterns.
Answers
D.
Continuous auditing tools are less complex for auditors to manage.
D.
Continuous auditing tools are less complex for auditors to manage.
Answers
Suggested answer: C

Explanation:

The feature of continuous auditing that provides the BEST level of assurance over traditional sampling is that voluminous data can be analyzed at a high speed to show relevant patterns. This is because continuous auditing is a technique that uses automated tools and processes to perform audit activities on a continuous or near-real-time basis, and to analyze large amounts of data from various sources and systems. Continuous auditing helps to provide a higher level of assurance than traditional sampling, by covering the entire population of transactions or events, rather than a subset or sample, and by identifying trends, anomalies, or exceptions that may indicate risks or issues. The other options are not features of continuous auditing that provide the best level of assurance over traditional sampling, but rather different aspects or benefits of continuous auditing, such as reporting frequency (A), reliability (B), or complexity (D).

Which process converts extracted information to a format understood by investigators?

A.
Reporting
A.
Reporting
Answers
B.
Ingestion
B.
Ingestion
Answers
C.
imaging
C.
imaging
Answers
D.
Filtering
D.
Filtering
Answers
Suggested answer: A

Explanation:

The process that converts extracted information to a format understood by investigators is reporting. This is because reporting is a technique that involves presenting and communicating the results and findings of an investigation in a clear, concise, and accurate manner, using appropriate formats, such as tables, charts, graphs, etc. Reporting helps to convey the meaning and significance of the extracted information to the investigators, as well as other stakeholders, such as management, auditors, regulators, etc. The other options are not processes that convert extracted information to a format understood by investigators, but rather different techniques that are related to information extraction or analysis, such as ingestion (B), imaging C, or filtering (D).

Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

A.
Processes are approved by the process owner.
A.
Processes are approved by the process owner.
Answers
B.
Processes are aligned with industry best practices.
B.
Processes are aligned with industry best practices.
Answers
C.
Processes are centralized and standardized.
C.
Processes are centralized and standardized.
Answers
D.
Processes are updated and documented annually.
D.
Processes are updated and documented annually.
Answers
Suggested answer: B

Explanation:

The MOST important thing to verify when reviewing the effectiveness of an organization's identity management program is whether the processes are aligned with industry best practices. Identity management is the process of managing the identities and access rights of users across an organization's systems and resources. Industry best practices provide guidelines and standards for how to implement identity management in a secure, efficient, and compliant manner.

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

A.
common vulnerabilities.
A.
common vulnerabilities.
Answers
B.
unknown vulnerabilities.
B.
unknown vulnerabilities.
Answers
C.
known vulnerabilities.
C.
known vulnerabilities.
Answers
D.
zero-day vulnerabilities.
D.
zero-day vulnerabilities.
Answers
Suggested answer: C

Explanation:

The MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect known vulnerabilities. This is because vulnerability scanners rely on databases or repositories of known vulnerabilities, such as CVE (Common Vulnerabilities and Exposures), to compare and identify the weaknesses or flaws in systems or applications. Vulnerability scanners cannot detect unknown vulnerabilities, such as zero-day vulnerabilities, that have not been reported or disclosed yet, and may be exploited by attackers before they are patched or fixed. The other options are not the most significant limitation of vulnerability scanning, because they either involve detecting common (A), unknown (B), or zero-day (D) vulnerabilities, which are not the capabilities or limitations of modern scanners.

Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?

A.
Using open source discovery
A.
Using open source discovery
Answers
B.
Scanning the network perimeter
B.
Scanning the network perimeter
Answers
C.
Social engineering
C.
Social engineering
Answers
D.
Crafting counterfeit websites
D.
Crafting counterfeit websites
Answers
Suggested answer: A

Explanation:

A passive activity that could be used by an attacker during reconnaissance to gather information about an organization is using open source discovery. This is because open source discovery is a technique that involves collecting and analyzing publicly available information about an organization, such as its website, social media, press releases, annual reports, etc. Open source discovery does not require any direct interaction or communication with the target organization or its systems or network, and therefore does not generate any traffic or alerts that could be detected by the organization's security controls. The other options are not passive activities that could be used by an attacker during reconnaissance to gather information about an organization, but rather active activities that involve direct or indirect interaction or communication with the target organization or its systems or network, such as scanning the network perimeter (B), social engineering C, or crafting counterfeit websites (D).

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

A.
It is more secure
A.
It is more secure
Answers
B.
It is more reliable
B.
It is more reliable
Answers
C.
It is higher speed.
C.
It is higher speed.
Answers
D.
It is more cost effective.
D.
It is more cost effective.
Answers
Suggested answer: D

Explanation:

The GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers is that it is more cost effective. This is because a VPN is a technology that creates a secure and encrypted connection between a client and a server over an existing public network, such as the Internet. A VPN reduces the cost of establishing and maintaining a secure communication channel, as it does not require any additional hardware, software, or infrastructure, unlike dedicated circuits and dial-in servers, which require dedicated lines, modems, routers, switches, etc. The other options are not the greatest advantage of using a VPN over dedicated circuits and dial-in servers, because they either involve security (A), reliability (B), or speed C aspects that may not be significantly different or better than dedicated circuits and dial-in servers.

Total 75 questions
Go to page: of 8