Free Cybersecurity-Audit-Certificate Exam Braindumps (page: 9)

Page 8 of 35

in key protection/management, access should be aligned with which of the following?

  1. System limitation
  2. Least privilege
  3. Position responsibilities
  4. Role descriptions

Answer(s): B

Explanation:

In key protection/management, access should be aligned with the principle of least privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.



Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

  1. demit/ and access management (1AM)
  2. Security operations center (SOC)
  3. Security training and awareness
  4. Security information and event management (SEM)

Answer(s): B

Explanation:

A security operations center (SOC) is a centralized unit that monitors, detects, analyzes, and responds to cyber threats and incidents in real time. A SOC enables continuous identification and mitigation of security threats to an organization by using various tools, processes, and expertise.



Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

  1. Malware researchers
  2. Hacktivists
  3. Cybercriminals
  4. Script kiddies

Answer(s): B

Explanation:

Hacktivists are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends. They may use various methods such as defacing websites, launching denial-of-service attacks, leaking confidential information, or spreading propaganda to advance their causes or protest against perceived injustices.



What is the PRIMARY purpose of creating a security architecture?

  1. To visually show gaps in information security controls
  2. To create a long-term information security strategy
  3. To map out how security controls interact with an organization's systems
  4. To provide senior management a measure of information security maturity

Answer(s): B

Explanation:

The PRIMARY purpose of creating a security architecture is to create a long-term information security strategy that aligns with the organization's business goals and objectives. A security architecture defines the vision, principles, standards, policies, and guidelines for how security will be implemented and managed across the organization's systems, networks, and data.






Post your Comments and Discuss ISACA Cybersecurity-Audit-Certificate exam with other Community members: