FreeQAs
 Request Exam  Contact
  • Home
  • View All Exams
  • New QA's
  • Upload
PRACTICE EXAMS:
  • Oracle
  • Fortinet
  • Juniper
  • Microsoft
  • Cisco
  • Citrix
  • CompTIA
  • VMware
  • SAP
  • EMC
  • PMI
  • HP
  • Salesforce
  • Other
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. ISACA Certification
  3. Cybersecurity-Audit-Certificate Exam
  4. ISACA.Cybersecurity-Audit-Certificate.v2024-06-25.q69 Dumps
  • ««
  • «
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
Download Now

Question 61

Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?

Correct Answer: C
DNS data exfiltration poses a significant threat to mobile computing mainly because it is challenging to differentiate between malicious activity and legitimate DNS traffic. Attackers can exploit this by embedding data within DNS queries and responses, which often go unnoticed because DNS traffic is generally allowed through firewalls and security systems without triggering alerts. This method of data theft can be particularly effective in mobile computing, where devices frequently switch networks and rely on DNS for connectivity.
Reference = ISACA's resources on cybersecurity risks associated with DNS highlight the difficulty in detecting DNS data exfiltration due to its ability to blend in with normal traffic. This is further supported by industry resources that discuss the challenges in identifying and preventing such exfiltration techniques1234.
insert code

Question 62

Using digital evidence to provide validation that an attack has actually occurred is an example of;

Correct Answer: A
Using digital evidence to provide validation that an attack has actually occurred is an example of computer forensics. This is because computer forensics is a discipline that involves the identification, preservation, analysis, and presentation of digital evidence from various sources, such as computers, networks, mobile devices, etc., to support investigations of cyber incidents or crimes. Computer forensics helps to provide validation that an attack has actually occurred, by examining the digital traces or artifacts left by the attackers on the compromised systems or devices, and by reconstructing the sequence and timeline of events that led to the attack. The other options are not examples of using digital evidence to provide validation that an attack has actually occurred, but rather different techniques or processes that are related to computer forensics, such as extraction (B), identification C, or data acquisition (D).
insert code

Question 63

Which of the following is the MAIN purpose of system hardening?

Correct Answer: C
System hardening is a process that involves implementing security measures to reduce the system's vulnerability. The main purpose of this process is to limit the number of attack vectors that can be exploited by threats. By removing unnecessary programs, closing unused ports, and applying security patches, the system's attack surface is reduced, making it more difficult for attackers to find vulnerabilities to exploit.
insert code

Question 64

Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?

Correct Answer: C
When fraud has been detected following an incident, a forensics audit is the most relevant type of audit to conduct. A forensics audit is specifically designed to investigate and uncover evidence of fraud, misconduct, or other financial crimes. It involves the use of auditing and investigative skills to examine financial records, identify irregularities, and gather evidence that can be used in legal proceedings1.
insert code

Question 65

Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?

Correct Answer: A
Explanation
The device that is at GREATEST risk from activity monitoring and data retrieval is mobile devices. This is because mobile devices are devices that are portable, wireless, and connected to the Internet or other networks, such as smartphones, tablets, laptops, etc. Mobile devices are at greatest risk from activity monitoring and data retrieval, because they can be easily lost, stolen, or compromised by attackers who can access or extract the data stored or transmitted on the devices. Mobile devices can also be subject to activity monitoring and data retrieval by third-party applications or services that may collect or share the user's personal or sensitive information without their consent or knowledge. The other options are not devices that are at greatest risk from activity monitoring and data retrieval, but rather different types of devices that may have different levels of risk or protection from activity monitoring and data retrieval, such as cloud storage devices (B), desktop workstations C, or printing devices (D).
insert code
  • ««
  • «
  • …
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • »
[×]

Download PDF File

Enter your email address to download ISACA.Cybersecurity-Audit-Certificate.v2024-06-25.q69 Dumps

Email:

FreeQAs

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2026 FreeQAs

www.freeqas.com materials do not contain actual questions and answers from Cisco's certification exams.