ISACA Cybersecurity Audit Study Guide
ISACA Cybersecurity Audit Study Guide
CYBERSECURITY AUDIT
Table of Contents:
Get an Overview of the Cybersecurity Audit Certification: ............ 2
Question: 1
a) Granting users only the privileges that are essential to perform their intended functions.
b) Ensuring that all users have equal access rights to prevent discrimination.
c) Assigning more privileges than necessary to ensure that users do not encounter access
issues.
d) Providing privileges based on seniority within the organization.
Answer: a
Question: 2
a) Ensuring cost-effectiveness
b) Verifying service level agreements
c) Evaluating the financial stability of the vendor
d) Assessing compliance with security requirements
Answer: d
Question: 3
Answer: a
Question: 4
Question: 5
When performing a cybersecurity audit, which of the following best ensures the integrity of data
in transit?
a) Network segmentation
b) Strong encryption
c) Biometric authentication
d) Redundant systems
Answer: b
Question: 6
How do cybersecurity audits review the effectiveness of the incident detection tools and
techniques?
Answer: c
Question: 7
Answer: b
Question: 8
Question: 9
During a cybersecurity audit, what is a key consideration when evaluating data protection
measures?
Answer: c
Question: 10
Which TWO of the following elements are essential for an effective cybersecurity governance
framework?
Answer: b, c