Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca Cybersecurity-Audit-Certificate Practice Exam with Questions & Answers

Questions 1

Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?

Options:
A.

Level of management involvement

B.

Resources available for the IT security team

C.

Level of risk to the organization's data

D.

Origin of intrusion and attack methods

Isaca Cybersecurity-Audit-Certificate Premium Access
Questions 2

Which of the following is a feature of a stateful inspection firewall?

Options:
A.

It tracks the destination IP address of each packet that leaves the organization's internal network.

B.

It is capable of detecting and blocking sophisticated attacks

C.

It prevents any attack initiated and originated by an insider.

D.

It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.

Questions 3

Which of the following is the PRIMARY goal of implementing a change management process?

Options:
A.

To ensure changes are communicated to the process owners prior to going live

B.

To minimize disruptions to the business from system changes

C.

To ensure that changes made to a system are performed on schedule

D.

To validate that changes to the system provide the expected return on investment

Questions 4

Which of the following is a limitation of intrusion detection systems (IDS)?

Options:
A.

Limited evidence on intrusive activity

B.

Application-level vulnerabilities

C.

Lack of Interface with system tools

D.

Weak passwords for the administration console

Questions 5

Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?

Options:
A.

Remediation efforts are communicated to management

B.

The vulnerability program is formally approved

C.

The vulnerability program is reviewed annually.

D.

Remediation efforts are prioritized.

Questions 6

What is the PRIMARY purpose of creating a security architecture?

Options:
A.

To visually show gaps in information security controls

B.

To create a long-term information security strategy

C.

To map out how security controls interact with an organization's systems

D.

To provide senior management a measure of information security maturity

Questions 7

The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:

Options:
A.

a mapping to multiple control frameworks.

B.

severity rankings for identified deficiencies.

C.

templates of vetted cloud auditing programs.

D.

control specifications prioritized by importance.

Questions 8

Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?

Options:
A.

Ingestion

B.

Extraction

C.

Imaging

D.

Filtering

Questions 9

Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

Options:
A.

Industry-specific security regulator

B.

Cybercrime, hacktism. and espionage

C.

Cybersecurity risk scenarios

D.

Cybersecurity operations management

Questions 10

Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

Options:
A.

demit/ and access management (1AM)

B.

Security operations center (SOC)

C.

Security training and awareness

D.

Security information and event management (SEM)

Certification Provider: Isaca
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Jul 15, 2025
Questions: 134