Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cybersecurity Audit Changed Cybersecurity-Audit-Certificate Questions

ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Question 17

What is the MAIN objective of an intrusion detection system (IDS) policy?

Options:

A.

To define the assets covered by intrusion detection systems (IDSs)

B.

To establish the criteria and reporting requirements associated with intrusion events

C.

To define the response time required of security personnel when an intrusion is detected

D.

To establish the actions to be taken by security personnel in the event an intruder is detected

Question 18

Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?

Options:

A.

Adversarial threat event

B.

Exfiltration attack vector

C.

Infiltration attack vector

D.

Kill chain modeling

Question 19

A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?

Options:

A.

No, because the risk management function should be the body that makes risk-related decisions for the organization.

B.

Yes, because the second line of defense is generally on a higher organizational level than the first line.

C.

No, because the risk management's oversight function would potentially lose its ability to objectively monitor and measure the business.

D.

Yes, because this arrangement ensures adequate oversight and enforcement of risk management in the organization.

Question 20

What is the PRIMARY benefit of ensuring timely and reliable access to information systems?

Options:

A.

Improved data integrity

B.

Consistent reporting functionality

C.

Enhanced identity and access management

D.

Increased data availability