Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca Cybersecurity-Audit-Certificate Practice Exam with Questions & Answers | Set: 4

Questions 31

Which control mechanism is used to detect the unauthorized modification of key configuration settings?

Options:
A.

Sandboxing

B.

Whitelisting

C.

URL filtering

D.

File integrity

Isaca Cybersecurity-Audit-Certificate Premium Access
Questions 32

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

Options:
A.

Reports can be generated more frequently for management.

B.

Automated tools provide more reliability than an auditors personal judgment

C.

Voluminous dale can be analyzed at a high speed to show relevant patterns.

D.

Continuous auditing tools are less complex for auditors to manage.

Questions 33

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

Options:
A.

On demand self-service

B.

Elasticity

C.

Measured service

D.

Resource pooling

Questions 34

Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?

Options:
A.

Risk assessment

B.

Maturity model

C.

Contingency planning

D.

Security assessment

Questions 35

Which of the following is the MOST serious consequence of mobile device loss or theft?

Options:
A.

Cost of purchasing replacement devices

B.

Physical damage to devices

C.

Installation of unauthorized applications

D.

Compromise of transient data

Questions 36

The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?

Options:
A.

Perform background checks on any users or support with administrator access.

B.

Ensure frequent log monitoring of the administrator by a manager.

C.

Set up multi-factor authentication for privileged accounts.

D.

Require the administrator to create a separate non-privileged user account for user tasks.

Questions 37

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

Options:
A.

It is difficult to know the applicable regulatory requirements when data is located on another country.

B.

Providers may be reluctant to share technical delays on the extent of their information protection mechanisms.

C.

Providers may be restricted from providing detailed ^formation on their employees.

D.

It is difficult to determine vendor financial viability to assess their potential inability to meet contract requirements.

Questions 38

The most common use of asymmetric algorithms is to:

Options:
A.

encrypt bulk data.

B.

encrypt data streams.

C.

distribute symmetric keys.

D.

distribute asymmetric keys.

Questions 39

Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

Options:
A.

It is more secure

B.

It is more reliable

C.

It is higher speed.

D.

It is more cost effective.

Questions 40

Which of the following BEST characterizes security mechanisms for mobile devices?

Options:
A.

Easy to control through mobile device management

B.

Comparatively weak relative to workstations

C.

Inadequate for organizational use

D.

Configurable and reliable across device types

Certification Provider: Isaca
Exam Name: ISACA Cybersecurity Audit Certificate Exam
Last Update: Jul 16, 2025
Questions: 134