Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Cybersecurity Audit Cybersecurity-Audit-Certificate Passing Score

ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Question 25

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:

A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Question 26

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Options:

A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Question 27

Which type of tools look for anomalies in user behavior?

Options:

A.

Rootkit detection tools

B.

Trend/variance-detection tools

C.

Audit reduction tools

D.

Attack-signature-detection tools

Question 28

in key protection/management, access should be aligned with which of the following?

Options:

A.

System limitation

B.

Least privilege

C.

Position responsibilities

D.

Role descriptions