Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Selected Cybersecurity-Audit-Certificate Cybersecurity Audit Questions Answers

ISACA Cybersecurity Audit Certificate Exam Questions and Answers

Question 33

Which of the following backup procedures would only copy files that have changed since the last backup was made?

Options:

A.

Incremental backup

B.

Differential backup

C.

Daily backup

D.

Full backup

Question 34

The most common use of asymmetric algorithms is to:

Options:

A.

encrypt bulk data.

B.

encrypt data streams.

C.

distribute symmetric keys.

D.

distribute asymmetric keys.

Question 35

Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?

Options:

A.

Endpoint protection

B.

Intrusion detection system (IDS)

C.

Virtual private network (VPN)

D.

Intrusion prevention system (IPS)

Question 36

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:

A.

Reports can be generated more frequently for management.

B.

Automated tools provide more reliability than an auditors personal judgment

C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.

D.

Continuous auditing tools are less complex for auditors to manage.