Isaca Cybersecurity Audit Certificate Exam Practice Test

Page: 1 / 14
Total 134 questions
Question 1

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?



Answer : D

A web application firewall (WAF) is specifically designed to monitor, filter, and block HTTP traffic to and from a web application. It is different from other types of firewalls because it can filter the content of specific web applications. By inspecting HTTP traffic, a WAF can prevent attacks stemming from web application security flaws, such as SQL injection and cross-site scripting (XSS), file inclusion, and security misconfigurations.


Question 2
Question 3

Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?



Answer : B

The increasing amount of storage space available on mobile devices poses the greatest concern for organizations needing to protect sensitive data. Larger storage capacities allow for more data to be stored on a device, which can include sensitive organizational information. If such a device is lost, stolen, or compromised, the potential for sensitive data to be accessed increases significantly. Additionally, the more data a device can hold, the more attractive it becomes as a target for attackers.

Reference= ISACA's resources highlight the risks associated with mobile devices' storage capabilities, especially when they contain sensitive organizational data.The threats, vulnerabilities, and risks related to the storage of sensitive data on mobile devices are discussed, emphasizing the importance of protecting such data from unauthorized access123.


Question 4

Which of the following is the MAIN purpose of system hardening?



Answer : C

System hardening is a process that involves implementing security measures to reduce the system's vulnerability. The main purpose of this process is to limit the number of attack vectors that can be exploited by threats. By removing unnecessary programs, closing unused ports, and applying security patches, the system's attack surface is reduced, making it more difficult for attackers to find vulnerabilities to exploit.


Question 5

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?



Answer : C

Imaging is the process used by an IS auditor to create a bit-for-bit copy of data. This method ensures that an exact replica of the data is made, preserving all the information in the same structure and format as the original. Imaging is essential for tasks such as digital forensics, where maintaining the integrity of the data is critical.


Question 6

Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?



Answer : A

The principle of least privilege is a security concept that restricts users' access rights to only what is strictly necessary for their job functions. This control is the most effective in preventing unauthorized data access because it minimizes the chances of users, either intentionally or unintentionally, accessing data they are not authorized to view. It ensures that users are granted the minimum levels of access -- or permissions -- needed to perform their work. This reduces the risk of accidental or deliberate access to sensitive information.


Question 7

The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?



Answer : D

The presence of known dangerous artifacts like malicious IP addresses or domain names on a network typically indicates that a security breach has occurred or is in progress. These artifacts are often recognized as indicators of compromise (IoCs), which are pieces of forensic data, such as system log entries or files, that identify potentially malicious activity on a system or network. Identifying IoCs is crucial for cybersecurity as it allows organizations to detect breaches quickly and respond to them promptly.


Page:    1 / 14   
Total 134 questions