ExamGecko
Home Home / Isaca / Cybersecurity Audit

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 7

Question list
Search
Search

Which of the following BEST characterizes security mechanisms for mobile devices?

A.
Easy to control through mobile device management
A.
Easy to control through mobile device management
Answers
B.
Comparatively weak relative to workstations
B.
Comparatively weak relative to workstations
Answers
C.
Inadequate for organizational use
C.
Inadequate for organizational use
Answers
D.
Configurable and reliable across device types
D.
Configurable and reliable across device types
Answers
Suggested answer: A

Explanation:

The BEST characteristic that describes security mechanisms for mobile devices is easy to control through mobile device management. This is because mobile device management is a technique that allows organizations to centrally manage and secure mobile devices, such as smartphones, tablets, laptops, etc., that are used by their employees or customers. Mobile device management helps to enforce security policies, configure settings, install applications, monitor usage, wipe data, etc., on mobile devices remotely and efficiently. The other options are not characteristics that describe security mechanisms for mobile devices, but rather different aspects or factors that affect security mechanisms for mobile devices, such as weakness (B), inadequacy C, or reliability (D).

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

A.
Incompatibility with cloud service business model
A.
Incompatibility with cloud service business model
Answers
B.
Lack of specificity m the principles
B.
Lack of specificity m the principles
Answers
C.
Omission of confidentiality in the criteria
C.
Omission of confidentiality in the criteria
Answers
D.
Inability to issue SOC 2 or SOC 3 reports
D.
Inability to issue SOC 2 or SOC 3 reports
Answers
Suggested answer: B

Explanation:

The GREATEST drawback when using the AICPA/CICA Trust Services to evaluate a cloud service provider is the lack of specificity in the principles. This is because the AICPA/CICA Trust Services are a set of principles and criteria that provide guidance for evaluating and reporting on controls over information systems and services. However, the principles and criteria are very broad and generic, and do not address the specific risks and challenges that are associated with cloud services, such as data sovereignty, multi-tenancy, portability, etc. The other options are not drawbacks when using the AICPA/CICA Trust Services to evaluate a cloud service provider, but rather different aspects or benefits of using the AICPA/CICA Trust Services to evaluate a cloud service provider, such as compatibility (A), confidentiality C, or reporting (D).

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

A.
On demand self-service
A.
On demand self-service
Answers
B.
Elasticity
B.
Elasticity
Answers
C.
Measured service
C.
Measured service
Answers
D.
Resource pooling
D.
Resource pooling
Answers
Suggested answer: C

Explanation:

The cloud characteristic that refers to resource utilization that can be optimized by leveraging charge-per-use capabilities is measured service. This is because measured service is a characteristic of cloud computing that involves monitoring, controlling, and reporting on the usage and consumption of cloud resources by cloud providers and consumers. Measured service helps to optimize resource utilization by leveraging charge-per-use capabilities, which means that cloud consumers only pay for the amount of resources that they actually use or consume, rather than paying for fixed or predetermined amounts of resources. The other options are not cloud characteristics that refer to resource utilization that can be optimized by leveraging charge-per-use capabilities, but rather different characteristics of cloud computing that describe other aspects or benefits of cloud services, such as on demand self-service (A), elasticity (B), or resource pooling (D).

Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?

A.
Significant investments and specialized security skills are not required.
A.
Significant investments and specialized security skills are not required.
Answers
B.
Enterprises can use the latest technologies to counter threats that are constantly evolving.
B.
Enterprises can use the latest technologies to counter threats that are constantly evolving.
Answers
C.
SECaaS providers are compliant with specific security requirements and new regulations.
C.
SECaaS providers are compliant with specific security requirements and new regulations.
Answers
D.
Available security services from providers are affordable to enterprises of all sizes.
D.
Available security services from providers are affordable to enterprises of all sizes.
Answers
Suggested answer: A

Explanation:

A MAIN benefit of using Security as a Service (SECaaS) providers is thatsignificant investments and specialized security skills are not required. SECaaS is a type of cloud service model that provides security solutions and services to customers over the internet. SECaaS providers can offer various security functions such as antivirus, firewall, encryption, identity management, vulnerability scanning, and incident response. By using SECaaS providers, customers can save costs and resources on acquiring, maintaining, and updating security hardware and software. Customers can also leverage the expertise and experience of the SECaaS providers to address their security needs and challenges.

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

A.
tokens stored as plain text in many mobile device applications.
A.
tokens stored as plain text in many mobile device applications.
Answers
B.
use of data transmission that is not always encrypted.
B.
use of data transmission that is not always encrypted.
Answers
C.
generic names that mobile devices will accept without verification.
C.
generic names that mobile devices will accept without verification.
Answers
D.
weak authentication protocols in wireless networks.
D.
weak authentication protocols in wireless networks.
Answers
Suggested answer: C

Explanation:

The risk of an evil twin attack on mobile devices is PRIMARILY due to theuse of generic names that mobile devices will accept without verification. An evil twin attack is a type of wireless network attack where an attacker sets up a rogue access point that mimics a legitimate one. The attacker can then lure unsuspecting users to connect to the rogue access point and intercept their data or launch further attacks. Mobile devices are vulnerable to evil twin attacks because they often use generic names for their wireless networks, such as ''Free WiFi'' or ''Public Hotspot''. These names can be easily spoofed by an attacker and accepted by mobile devices without verifying the identity or security of the access point.

Which of the following is a feature of a stateful inspection firewall?

A.
It tracks the destination IP address of each packet that leaves the organization's internal network.
A.
It tracks the destination IP address of each packet that leaves the organization's internal network.
Answers
B.
It is capable of detecting and blocking sophisticated attacks
B.
It is capable of detecting and blocking sophisticated attacks
Answers
C.
It prevents any attack initiated and originated by an insider.
C.
It prevents any attack initiated and originated by an insider.
Answers
D.
It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.
D.
It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.
Answers
Suggested answer: B

Explanation:

A feature of a stateful inspection firewall is that it iscapable of detecting and blocking sophisticated attacks. A stateful inspection firewall is a type of firewall that monitors and analyzes the state and context of network traffic. It keeps track of the source, destination, protocol, port, and session information of each packet and compares it with a set of predefined rules. A stateful inspection firewall can detect and block attacks that exploit the logic or behavior of network protocols or applications, such as fragmentation attacks, session hijacking, or application-layer attacks.

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

A.
data in use.
A.
data in use.
Answers
B.
data redundancy.
B.
data redundancy.
Answers
C.
data availability.
C.
data availability.
Answers
D.
data at rest.
D.
data at rest.
Answers
Suggested answer: D

Explanation:

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managingdata at rest. Data at rest is data that is stored on a device or media, such as hard disks, flash drives, tapes, or CDs. Data at rest can be exposed to unauthorized access, theft, or loss if not properly protected. A DLP solution is a tool that monitors and controls the movement and usage of data across an organization's network or endpoints. A DLP solution can prevent users from saving sensitive data to removable devices or alert on any violations of data policies.

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to 'always on' mode?

A.
An adversary can predict a user's login credentials.
A.
An adversary can predict a user's login credentials.
Answers
B.
Mobile connectivity could be severely weakened.
B.
Mobile connectivity could be severely weakened.
Answers
C.
A user's behavior pattern can be predicted.
C.
A user's behavior pattern can be predicted.
Answers
D.
Authorization tokens could be exploited.
D.
Authorization tokens could be exploited.
Answers
Suggested answer: D

Explanation:

The GREATEST risk pertaining to sensitive data leakage when users set mobile devices to ''always on'' mode is thatauthorization tokens could be exploited. Authorization tokens are pieces of data that are used to authenticate users and grant them access to certain resources or services. Authorization tokens are often stored on mobile devices to enable seamless and convenient access without requiring users to enter their credentials repeatedly. However, if users set their mobile devices to ''always on'' mode, they increase the risk of losing their devices or having them stolen by attackers. Attackers can then access the authorization tokens stored on the devices and use them to impersonate the users or access their sensitive data.

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.
Resource contention
A.
Resource contention
Answers
B.
Identity spoofing and phishing
B.
Identity spoofing and phishing
Answers
C.
Confidentiality, integrity, and availability
C.
Confidentiality, integrity, and availability
Answers
D.
Denial of service
D.
Denial of service
Answers
Suggested answer: C

Explanation:

The MOST important thing for an IS auditor to consider in an assessment of the potential risk factors when a cloud service provider has not adequately secured its application programming interface (API) is the impact on theconfidentiality, integrity, and availabilityof the cloud service. An API is a set of rules and protocols that allows communication and interaction between different software components or systems. An API is often used by cloud service providers to enable customers to access and manage their cloud resources and services. However, if an API is not adequately secured, it can expose the cloud service provider and its customers to various threats, such as unauthorized access, data breaches, tampering, denial-of-service attacks, or malicious code injection.

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

A.
Fortified demilitarized zone
A.
Fortified demilitarized zone
Answers
B.
Software defined perimeter
B.
Software defined perimeter
Answers
C.
Layer 3 virtual private network
C.
Layer 3 virtual private network
Answers
D.
Virtual local area network
D.
Virtual local area network
Answers
Suggested answer: D

Explanation:

The MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization is using avirtual local area network (VLAN). A VLAN is a logical grouping of network devices that share the same broadcast domain regardless of their physical location or connection. A VLAN can enhance network security by isolating different types of traffic or users from each other and applying different security policies or rules based on the VLAN membership. For example, an organization can create a VLAN for HR desktops and internal laptop users that restricts their access to only HR-related systems or resources. A VLAN can also reduce network costs by saving bandwidth, improving performance, and simplifying management.


Total 75 questions
Go to page: of 8