Isaca
Cybersecurity-Audit-Certificate
Q1:
What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?
○
A
Users may access services over the VPN that are network resource intensive.○
B
Users may store the data in plain text on their mobile devices.○
C
Users may access the corporate network from unauthorized devices.○
D
Users may access services not supported by the VPN.
Isaca
Cybersecurity-Audit-Certificate
Q2:
Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?
○
A
HTTP protected by symmetric encryption○
B
HTTP with an encrypted session via Transport Layer Security○
C
HTTP protected by asymmetric encryption○
D
HTTP with an encrypted session via MD5 or RC4 protocols
Isaca
Cybersecurity-Audit-Certificate
Q3:
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
○
A
Password-based access control○
B
Digital signature○
C
Secret key encryption○
D
Cryptographic hash function
Isaca
Cybersecurity-Audit-Certificate
Q4:
Which of the following backup methods takes the MOST time for restoration of data?
○
A
Incremental backup○
B
Offsite backup○
C
Full backup○
D
Differential backup
Isaca
Cybersecurity-Audit-Certificate
Q5:
Which of the following controls BEST ensures a user creates a complex password?
○
A
Operating system rules○
B
Multi-factor authentication○
C
Information security awareness○
D
Biometrics