ExamGecko
Home Home / Isaca / Cybersecurity Audit

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 6

Question list
Search
Search

Which of the following is an example of an application security control?

A.
Secure coding
A.
Secure coding
Answers
B.
User security awareness training
B.
User security awareness training
Answers
C.
Security operations center
C.
Security operations center
Answers
D.
Intrusion detection
D.
Intrusion detection
Answers
Suggested answer: A

Explanation:

An example of an application security control issecure coding. Secure coding is the practice of developing software applications that follow security principles and standards to prevent or mitigate common vulnerabilities and risks. Secure coding involves applying techniques such as input validation, output encoding, error handling, encryption, and testing.

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

A.
Sandboxing
A.
Sandboxing
Answers
B.
Whitelisting
B.
Whitelisting
Answers
C.
URL filtering
C.
URL filtering
Answers
D.
File integrity
D.
File integrity
Answers
Suggested answer: D

Explanation:

The control mechanism that is used to detect the unauthorized modification of key configuration settings isfile integrity. File integrity is the property of ensuring that files are not altered or corrupted by unauthorized users or processes. File integrity can be monitored by using tools that compare the current state of files with a baseline or checksum and alert on any changes.

Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?

A.
Adversarial threat event
A.
Adversarial threat event
Answers
B.
Exfiltration attack vector
B.
Exfiltration attack vector
Answers
C.
Infiltration attack vector
C.
Infiltration attack vector
Answers
D.
Kill chain modeling
D.
Kill chain modeling
Answers
Suggested answer: B

Explanation:

An example of an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks is anexfiltration attack vector. An exfiltration attack vector is a method or channel that an APT uses to transfer data from a compromised system or network to an external location. Examples of exfiltration attack vectors include email, FTP, DNS, HTTP, or covert channels.

Which of the following is a limitation of intrusion detection systems (IDS)?

A.
Limited evidence on intrusive activity
A.
Limited evidence on intrusive activity
Answers
B.
Application-level vulnerabilities
B.
Application-level vulnerabilities
Answers
C.
Lack of Interface with system tools
C.
Lack of Interface with system tools
Answers
D.
Weak passwords for the administration console
D.
Weak passwords for the administration console
Answers
Suggested answer: B

Explanation:

A limitation of intrusion detection systems (IDS) is that they cannot detectapplication-level vulnerabilities. An IDS is a tool that monitors network traffic or system activity and alerts on any suspicious or malicious events. However, an IDS cannot analyze the logic or functionality of applications and identify vulnerabilities such as SQL injection, cross-site scripting, or broken authentication.

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

A.
Replication of privileged access and the greater likelihood of physical loss increases risk levels.
A.
Replication of privileged access and the greater likelihood of physical loss increases risk levels.
Answers
B.
The risk associated with mobile devices is less than that of other devices and systems.
B.
The risk associated with mobile devices is less than that of other devices and systems.
Answers
C.
The risk associated with mobile devices cannot be mitigated with similar controls for workstations.
C.
The risk associated with mobile devices cannot be mitigated with similar controls for workstations.
Answers
D.
The ability to wipe mobile devices and disable connectivity adequately mitigates additional
D.
The ability to wipe mobile devices and disable connectivity adequately mitigates additional
Answers
Suggested answer: A

Explanation:

The BEST response to an IT manager's statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device is thatreplication of privileged access and the greater likelihood of physical loss increases risk levels. Mobile devices pose unique risks to an organization due to their portability, connectivity, and functionality. Mobile devices may store or access sensitive data or systems that require privileged access, which can be compromised if the device is lost, stolen, or hacked. Mobile devices also have a higher chance of being misplaced or taken by unauthorized parties than other devices.

Which of the following is the MOST serious consequence of mobile device loss or theft?

A.
Cost of purchasing replacement devices
A.
Cost of purchasing replacement devices
Answers
B.
Physical damage to devices
B.
Physical damage to devices
Answers
C.
Installation of unauthorized applications
C.
Installation of unauthorized applications
Answers
D.
Compromise of transient data
D.
Compromise of transient data
Answers
Suggested answer: D

Explanation:

The MOST serious consequence of mobile device loss or theft is thecompromise of transient data. Transient data is data that is temporarily stored or processed on a mobile device, such as cached data, cookies, browsing history, passwords, or session tokens. Transient data can reveal sensitive information about the user or the organization and can be exploited by attackers to gain access to other systems or networks.

Which of the following is EASIEST for a malicious attacker to detect?

A.
Use of insufficient cryptography
A.
Use of insufficient cryptography
Answers
B.
Insecure storage of sensitive data
B.
Insecure storage of sensitive data
Answers
C.
Susceptibility to reverse engineering
C.
Susceptibility to reverse engineering
Answers
D.
Ability to tamper with mobile code
D.
Ability to tamper with mobile code
Answers
Suggested answer: C

Explanation:

The EASIEST thing for a malicious attacker to detect is thesusceptibility to reverse engineering. Reverse engineering is the process of analyzing the code or functionality of an application to understand its structure, logic, or design. Reverse engineering can be used by attackers to discover vulnerabilities, bypass security mechanisms, or modify the application's behavior. Mobile applications are often susceptible to reverse engineering because they are distributed in binary form and can be easily decompiled or disassembled.

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

A.
Private hosting
A.
Private hosting
Answers
B.
Public hosting
B.
Public hosting
Answers
C.
Shared hosting
C.
Shared hosting
Answers
D.
Hybrid hosting
D.
Hybrid hosting
Answers
Suggested answer: A

Explanation:

In cloud computing, the type of hosting that is MOST appropriate for a large organization that wants greater control over the environment isprivate hosting. Private hosting is a type of cloud service model where the cloud infrastructure is dedicated to a single organization and hosted either on-premise or off-premise by a third-party provider. Private hosting offers more control over the security, performance, customization, and compliance of the cloud environment than other types of hosting.

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

A.
Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.
A.
Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.
Answers
B.
Review the most recent legal and regulatory audit report conducted by an independent party.
B.
Review the most recent legal and regulatory audit report conducted by an independent party.
Answers
C.
Determine if there is a formal process to review changes in legal and regulatory requirements. D Obtain a list of relevant legal and regulatory requirements.
C.
Determine if there is a formal process to review changes in legal and regulatory requirements. D Obtain a list of relevant legal and regulatory requirements.
Answers
Suggested answer: A

Explanation:

The FIRST thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization is to determine if the cybersecurity program is mapped to relevant legal and regulatory requirements. This is because mapping the cybersecurity program to relevant legal and regulatory requirements helps to ensure that the organization has identified and addressed all the applicable laws and regulations that affect its cybersecurity posture, such as data protection, privacy, breach notification, etc. Mapping the cybersecurity program to relevant legal and regulatory requirements also helps to evaluate the alignment and compliance of the organization's cybersecurity policies, procedures, controls, and practices with the legal and regulatory requirements. The other options are not the first thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization, but rather follow after determining if the cybersecurity program is mapped to relevant legal and regulatory requirements, such as reviewing the most recent legal and regulatory audit report (B), determining if there is a formal process to review changes in legal and regulatory requirements C, or obtaining a list of relevant legal and regulatory requirements (D).

Which of the following is a feature of an intrusion detection system (IDS)?

A.
Intrusion prevention
A.
Intrusion prevention
Answers
B.
Automated response
B.
Automated response
Answers
C.
Interface with firewalls
C.
Interface with firewalls
Answers
D.
Back doors into applications
D.
Back doors into applications
Answers
Suggested answer: B

Explanation:

A feature of an intrusion detection system (IDS) is automated response. This is because an IDS is a system that monitors network or system activities for malicious or anomalous behavior, and alerts or reports on any detected incidents. An IDS can also perform automated response actions, such as blocking traffic, terminating sessions, or sending notifications, to contain or mitigate the incidents. The other options are not features of an IDS, but rather different concepts or techniques that are related to intrusion detection or prevention, such as intrusion prevention (A), interface with firewalls C, or back doors into applications (D).

Total 75 questions
Go to page: of 8