Isaca Cybersecurity Audit Certificate
Q: 1
Which of the following is MOST important to verify when reviewing the effectiveness of an
organization's identity management program?
Options
Q: 2
Which of the following provides the GREATEST assurance that data can be recovered and restored in
a timely manner in the event of data loss?
Options
Q: 3
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Options
Q: 4
Which phase typically occurs before containment of an incident?
Options
Q: 5
Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?
Options
Q: 6
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
Options
Q: 7
During which incident response phase is the incident management team activated?
Options
Q: 8
Which of the following backup procedures would only copy files that have changed since the last
backup was made?
Options
Q: 9
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Options
Q: 10
Why are security frameworks an important part of a cybersecurity strategy?
Options
Question 1 of 10