Isaca Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Practice Test

Page: 1 / 14
Total 134 questions
Question 1

Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?



Answer : D

Replicating privileged access to a user's own mobile device presents the greatest risk to corporate data. This is because it potentially allows unauthorized access to sensitive information if the device is lost, stolen, or compromised. Privileged access means having elevated permissions that are typically reserved for administrators. When such access is available on a personal device, it bypasses many of the security controls that a company would normally have in place.

Option A, remote wipe, is actually a security feature that can protect data if a device is lost or stolen. Option B, lack of training, can increase risk but does not directly expose data like privileged access does. Option C, devices not obtained through corporate provisioning, can be a risk, but this risk is generally less than that of replicating privileged access.


Question 2

Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?



Answer : C

The use of symmetric, private keys in WEP encryption is associated with several weaknesses, one of which is that the keys often remain unchanged on networks for extended periods. This can lead to security vulnerabilities because if an attacker manages to compromise a key, they can potentially gain access to the network and decrypt data for as long as the key remains unchanged.


Question 3

What is the MAIN objective of an intrusion detection system (IDS) policy?



Question 4

Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?



Answer : A

The characteristic of cloud computing that allows users to provision computing capabilities without human interaction from the service provider is known as on-demand self-service. This feature enables users to automatically manage their computing resources, such as server time and network storage, as needed, which provides agility and flexibility in resource management.


Question 5

Which of the following features of an anti-malware application is MOST helpful in protecting an organization from the potential of infected computers using a virtual private network (VPN)?



Answer : D

Data packet analysis is the most helpful feature of an anti-malware application in protecting an organization from the potential of infected computers using a VPN. This feature involves examining the data packets that are being transmitted over the network. By analyzing these packets, the anti-malware can detect malicious activity or anomalies that may indicate an infection. This is particularly important for VPN traffic, as it is encrypted and not easily inspected by traditional methods.


Question 6

Which phase typically occurs before containment of an incident?



Answer : A

The phase that typically occurs before containment in an incident response is Identification. This phase involves detecting and determining the nature of the incident. It's crucial to correctly identify an incident before it can be contained, as containment strategies may vary depending on the type of incident.


Question 7
Page:    1 / 14   
Total 134 questions