Isaca Cybersecurity-Audit-Certificate ISACA Cybersecurity Audit Certificate Exam Practice Test

Page: 1 / 14
Total 134 questions
Question 1

Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?



Answer : D

A web application firewall (WAF) is specifically designed to monitor, filter, and block HTTP traffic to and from a web application. It is different from other types of firewalls because it can filter the content of specific web applications. By inspecting HTTP traffic, a WAF can prevent attacks stemming from web application security flaws, such as SQL injection and cross-site scripting (XSS), file inclusion, and security misconfigurations.


Question 2
Question 3

Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?



Answer : B

The increasing amount of storage space available on mobile devices poses the greatest concern for organizations needing to protect sensitive data. Larger storage capacities allow for more data to be stored on a device, which can include sensitive organizational information. If such a device is lost, stolen, or compromised, the potential for sensitive data to be accessed increases significantly. Additionally, the more data a device can hold, the more attractive it becomes as a target for attackers.

Reference= ISACA's resources highlight the risks associated with mobile devices' storage capabilities, especially when they contain sensitive organizational data.The threats, vulnerabilities, and risks related to the storage of sensitive data on mobile devices are discussed, emphasizing the importance of protecting such data from unauthorized access123.


Question 4

Which of the following is the MAIN purpose of system hardening?



Answer : C

System hardening is a process that involves implementing security measures to reduce the system's vulnerability. The main purpose of this process is to limit the number of attack vectors that can be exploited by threats. By removing unnecessary programs, closing unused ports, and applying security patches, the system's attack surface is reduced, making it more difficult for attackers to find vulnerabilities to exploit.


Question 5

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?



Answer : C

Imaging is the process used by an IS auditor to create a bit-for-bit copy of data. This method ensures that an exact replica of the data is made, preserving all the information in the same structure and format as the original. Imaging is essential for tasks such as digital forensics, where maintaining the integrity of the data is critical.


Question 6

Which phase typically occurs before containment of an incident?



Answer : A

The phase that typically occurs before containment in an incident response is Identification. This phase involves detecting and determining the nature of the incident. It's crucial to correctly identify an incident before it can be contained, as containment strategies may vary depending on the type of incident.


Question 7
Page:    1 / 14   
Total 134 questions