ExamGecko
Home / Isaca / Cybersecurity Audit / List of questions
Ask Question

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

Which of the following is an example of an application security control?

Become a Premium Member for full access
  Unlock Premium Member

Question 52

Report Export Collapse

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

Become a Premium Member for full access
  Unlock Premium Member

Question 53

Report Export Collapse

Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?

Become a Premium Member for full access
  Unlock Premium Member

Question 54

Report Export Collapse

Which of the following is a limitation of intrusion detection systems (IDS)?

Become a Premium Member for full access
  Unlock Premium Member

Question 55

Report Export Collapse

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

Which of the following is the MOST serious consequence of mobile device loss or theft?

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

Which of the following is EASIEST for a malicious attacker to detect?

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

Which of the following is a feature of an intrusion detection system (IDS)?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8