Free Cybersecurity-Audit-Certificate Exam Braindumps (page: 8)

Page 7 of 35

Which of the following backup procedure would only copy files that have changed since the last backup was made?

  1. Incremental backup
  2. Daily backup
  3. Differential backup
  4. Full backup

Answer(s): A

Explanation:

The backup procedure that would only copy files that have changed since the last backup was made is an incremental backup. This is because an incremental backup is a type of backup that only copies the files that have been created or modified since the previous backup, whether it was a full or an incremental backup. An incremental backup helps to reduce the backup time and storage space, as well as the recovery time, as only the changed files need to be restored. The other options are not backup procedures that would only copy files that have changed since the last backup was made, but rather different types of backup procedures that copy files based on different criteria, such as daily backup (B), differential backup C, or full backup (D).



An information security procedure indicates a requirement to sandbox emails.
What does this requirement mean?

  1. Ensure the emails are encrypted and provide nonrepudiation.
  2. Provide a backup of emails in the event of a disaster
  3. isolate the emails and test for malicious content
  4. Guarantee rapid email delivery through firewalls.

Answer(s): C

Explanation:

An information security procedure that indicates a requirement to sandbox emails means that the emails need to be isolated and tested for malicious content. This is because sandboxing is a technique that creates a virtual or isolated environment, where suspicious or untrusted emails can be executed or analyzed without affecting the rest of the system or network. Sandboxing helps to detect and prevent malware, phishing, or spam attacks that may be embedded in emails, and protect the users and the organization from potential harm. The other options are not what sandboxing emails means, but rather different concepts or techniques that are related to information security, such as encryption and nonrepudiation (A), backup and recovery (B), or firewall and delivery (D).



Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?

  1. Reports can be generated more frequently for management.
  2. Automated tools provide more reliability than an auditors personal judgment
  3. Voluminous dale can be analyzed at a high speed to show relevant patterns.
  4. Continuous auditing tools are less complex for auditors to manage.

Answer(s): C

Explanation:

The feature of continuous auditing that provides the BEST level of assurance over traditional sampling is that voluminous data can be analyzed at a high speed to show relevant patterns. This is because continuous auditing is a technique that uses automated tools and processes to perform audit activities on a continuous or near-real-time basis, and to analyze large amounts of data from various sources and systems. Continuous auditing helps to provide a higher level of assurance than traditional sampling, by covering the entire population of transactions or events, rather than a subset or sample, and by identifying trends, anomalies, or exceptions that may indicate risks or issues. The other options are not features of continuous auditing that provide the best level of assurance over traditional sampling, but rather different aspects or benefits of continuous auditing, such as reporting frequency (A), reliability (B), or complexity (D).



Which process converts extracted information to a format understood by investigators?

  1. Reporting
  2. Ingestion
  3. imaging
  4. Filtering

Answer(s): A

Explanation:

The process that converts extracted information to a format understood by investigators is reporting. This is because reporting is a technique that involves presenting and communicating the results and findings of an investigation in a clear, concise, and accurate manner, using appropriate formats, such as tables, charts, graphs, etc. Reporting helps to convey the meaning and significance of the extracted information to the investigators, as well as other stakeholders, such as management, auditors, regulators, etc. The other options are not processes that convert extracted information to a format understood by investigators, but rather different techniques that are related to information extraction or analysis, such as ingestion (B), imaging C, or filtering (D).






Post your Comments and Discuss ISACA Cybersecurity-Audit-Certificate exam with other Community members: