Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca Cybersecurity-Audit-Certificate Practice Exam with Questions & Answers | Set: 2

Questions 11

Which of the following is the MOST important consideration when choosing between different types of cloud services?

Options:
A.

Emerging risk and infrastructure scalability

B.

Security features available on demand

C.

Overall risk and benefits

D.

Reputation of the cloud providers

Isaca Cybersecurity-Audit-Certificate Premium Access
Questions 12

In public key cryptography, digital signatures are primarily used to;

Options:
A.

ensure message integrity.

B.

ensure message accuracy.

C.

prove sender authenticity.

D.

maintain confidentiality.

Questions 13

An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:

Options:
A.

corporate risk management and assurance strategy.

B.

cybersecurity goals, objectives, and mission.

C.

organizational cybersecurity policies and procedures.

D.

governance, risk management, and compliance.

Questions 14

Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

Options:
A.

Single classification level allocation

B.

Business process re-engineering

C.

Business dependency assessment

D.

Comprehensive cyber insurance procurement

Questions 15

Which of the following continuous auditing tools scans and flags business transactions according to predefined criteria on a real-time basis?

Options:
A.

Vulnerability scanner

B.

Automated governance, risk, and compliance (GRC) tool

C.

Intrusion detection system (IDS)

D.

Real-time antivirus protection tool

Questions 16

Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?

Options:
A.

Comparison against information security policy

B.

Review of vulnerability scanning results

C.

Comparison against baseline standards

D.

Verification of user acceptance testing

Questions 17

Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?

Options:
A.

Adversarial threat event

B.

Exfiltration attack vector

C.

Infiltration attack vector

D.

Kill chain modeling

Questions 18

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

Options:
A.

Capability maturity model integration

B.

Balanced scorecard

C.

60 270042009

D.

COBIT 5

Questions 19

Which of the following controls BEST ensures a user creates a complex password?

Options:
A.

Operating system rules

B.

Multi-factor authentication

C.

Information security awareness

D.

Biometrics

Questions 20

he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:

Options:
A.

common vulnerabilities.

B.

unknown vulnerabilities.

C.

known vulnerabilities.

D.

zero-day vulnerabilities.

Certification Provider: Isaca
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Jul 15, 2025
Questions: 134