PDF無料ダウンロードにはCybersecurity-Audit-Certificate有効な練習テスト問題 [Q27-Q51]

Share

PDF無料ダウンロードにはCybersecurity-Audit-Certificate有効な練習テスト問題

Cybersecurity-Audit-Certificateテストエンジンお試しセット、Cybersecurity-Audit-Certificate問題集PDF

質問 # 27
Which of the following is a feature of a stateful inspection firewall?

  • A. It tracks the destination IP address of each packet that leaves the organization's internal network.
  • B. It prevents any attack initiated and originated by an insider.
  • C. It is capable of detecting and blocking sophisticated attacks
  • D. It translates the MAC address to the destination IP address of each packet that enters the organization's internal network.

正解:C

解説:
Explanation
A feature of a stateful inspection firewall is that it is capable of detecting and blocking sophisticated attacks. A stateful inspection firewall is a type of firewall that monitors and analyzes the state and context of network traffic. It keeps track of the source, destination, protocol, port, and session information of each packet and compares it with a set of predefined rules. A stateful inspection firewall can detect and block attacks that exploit the logic or behavior of network protocols or applications, such as fragmentation attacks, session hijacking, or application-layer attacks.


質問 # 28
Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

  • A. Cybercrime, hacktism. and espionage
  • B. Cybersecurity risk scenarios
  • C. Cybersecurity operations management
  • D. Industry-specific security regulator

正解:A

解説:
Explanation
Cyber threat intelligence aims to research and analyze trends and technical developments in the areas of cybercrime, hacktivism, and espionage. These are the main sources of malicious cyber activities that pose risks to organizations and individuals. Cyber threat intelligence helps to understand the motivations, capabilities, tactics, techniques, and procedures of various threat actors and groups.


質問 # 29
Which of the following is a feature of an intrusion detection system (IDS)?

  • A. Back doors into applications
  • B. Automated response
  • C. Intrusion prevention
  • D. Interface with firewalls

正解:B

解説:
Explanation
A feature of an intrusion detection system (IDS) is automated response. This is because an IDS is a system that monitors network or system activities for malicious or anomalous behavior, and alerts or reports on any detected incidents. An IDS can also perform automated response actions, such as blocking traffic, terminating sessions, or sending notifications, to contain or mitigate the incidents. The other options are not features of an IDS, but rather different concepts or techniques that are related to intrusion detection or prevention, such as intrusion prevention (A), interface with firewalls C, or back doors into applications (D).


質問 # 30
Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?

  • A. SECaaS providers are compliant with specific security requirements and new regulations.
  • B. Enterprises can use the latest technologies to counter threats that are constantly evolving.
  • C. Available security services from providers are affordable to enterprises of all sizes.
  • D. Significant investments and specialized security skills are not required.

正解:D

解説:
Explanation
A MAIN benefit of using Security as a Service (SECaaS) providers is that significant investments and specialized security skills are not required. SECaaS is a type of cloud service model that provides security solutions and services to customers over the internet. SECaaS providers can offer various security functions such as antivirus, firewall, encryption, identity management, vulnerability scanning, and incident response. By using SECaaS providers, customers can save costs and resources on acquiring, maintaining, and updating security hardware and software. Customers can also leverage the expertise and experience of the SECaaS providers to address their security needs and challenges.


質問 # 31
Availability can be protected through the use of:

  • A. logging, digital signatures, and write protection.
  • B. access controls. We permissions, and encryption.
  • C. user awareness training and related end-user training.
  • D. redundancy, backups, and business continuity management

正解:D

解説:
Explanation
Availability can be protected through the use of redundancy, backups, and business continuity management.
This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).


質問 # 32
What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

  • A. The ability to wipe mobile devices and disable connectivity adequately mitigates additional
  • B. The risk associated with mobile devices cannot be mitigated with similar controls for workstations.
  • C. The risk associated with mobile devices is less than that of other devices and systems.
  • D. Replication of privileged access and the greater likelihood of physical loss increases risk levels.

正解:D

解説:
Explanation
The BEST response to an IT manager's statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device is that replication of privileged access and the greater likelihood of physical loss increases risk levels. Mobile devices pose unique risks to an organization due to their portability, connectivity, and functionality. Mobile devices may store or access sensitive data or systems that require privileged access, which can be compromised if the device is lost, stolen, or hacked. Mobile devices also have a higher chance of being misplaced or taken by unauthorized parties than other devices.


質問 # 33
The second line of defense in cybersecurity includes:

  • A. risk management monitoring, and measurement of controls.
  • B. performing attack and breach penetration testing.
  • C. conducting organization-wide control self-assessments.
  • D. separate reporting to the audit committee within the organization.

正解:A

解説:
Explanation
The second line of defense in cybersecurity includes risk management monitoring, and measurement of controls. This is because the second line of defense is responsible for ensuring that the first line of defense (the operational managers and staff who own and manage risks) is effectively designed and operating as intended.
The second line of defense also provides guidance, oversight, and challenge to the first line of defense. The other options are not part of the second line of defense, but rather belong to the first line of defense (A), the third line of defense C, or an external service provider (D).


質問 # 34
Which of the following is the MOST serious consequence of mobile device loss or theft?

  • A. Physical damage to devices
  • B. Cost of purchasing replacement devices
  • C. Compromise of transient data
  • D. Installation of unauthorized applications

正解:C

解説:
Explanation
The MOST serious consequence of mobile device loss or theft is the compromise of transient data. Transient data is data that is temporarily stored or processed on a mobile device, such as cached data, cookies, browsing history, passwords, or session tokens. Transient data can reveal sensitive information about the user or the organization and can be exploited by attackers to gain access to other systems or networks.


質問 # 35
One way to control the integrity of digital assets is through the use of:

  • A. hashing.
  • B. policies.
  • C. frameworks.
  • D. caching

正解:A

解説:
Explanation
One way to control the integrity of digital assets is through the use of hashing. This is because hashing is a technique that applies a mathematical function to a digital asset, such as a file or a message, and produces a unique and fixed-length value, known as a hash or a digest. Hashing helps to verify the integrity of digital assets, by comparing the hash values before and after transmission or storage, and detecting any changes or modifications to the original asset. The other options are not ways to control the integrity of digital assets, but rather different concepts or techniques that are related to information security, such as policies (A), frameworks (B), or caching C.


質問 # 36
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

  • A. Basedine
  • B. Frameworks
  • C. Guidelines
  • D. Standards

正解:D

解説:
Explanation
Specific, mandatory controls or rules to support and comply with a policy are known as standards. This is because standards define the minimum level of performance or behavior that is expected from an organization or its employees in order to achieve a policy objective or requirement. Standards also provide clear and measurable criteria for auditing and monitoring compliance with policies. The other options are not specific, mandatory controls or rules to support and comply with a policy, but rather different types of documents or tools that provide guidance or recommendations for implementing policies or controls, such as frameworks (A), guidelines (B), or baselines C.


質問 # 37
in key protection/management, access should be aligned with which of the following?

  • A. Role descriptions
  • B. Position responsibilities
  • C. System limitation
  • D. Least privilege

正解:D

解説:
Explanation
In key protection/management, access should be aligned with the principle of least privilege. This means that users should only have the minimum level of access required to perform their tasks and no more. This reduces the risk of unauthorized access, misuse, or compromise of sensitive data or systems.


質問 # 38
In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

  • A. Hybrid hosting
  • B. Public hosting
  • C. Private hosting
  • D. Shared hosting

正解:C

解説:
Explanation
In cloud computing, the type of hosting that is MOST appropriate for a large organization that wants greater control over the environment is private hosting. Private hosting is a type of cloud service model where the cloud infrastructure is dedicated to a single organization and hosted either on-premise or off-premise by a third-party provider. Private hosting offers more control over the security, performance, customization, and compliance of the cloud environment than other types of hosting.


質問 # 39
Which of the following is an example of an application security control?

  • A. User security awareness training
  • B. Secure coding
  • C. Security operations center
  • D. Intrusion detection

正解:B

解説:
Explanation
An example of an application security control is secure coding. Secure coding is the practice of developing software applications that follow security principles and standards to prevent or mitigate common vulnerabilities and risks. Secure coding involves applying techniques such as input validation, output encoding, error handling, encryption, and testing.


質問 # 40
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?

  • A. Packet filters
  • B. Sensors
  • C. Analyzers
  • D. Administration modules

正解:B

解説:
Explanation
The intrusion detection system component that is responsible for collecting data in the form of network packets, log files, or system call traces is sensors. This is because sensors are components of an intrusion detection system that are deployed on various locations or points of the network or system, such as routers, switches, servers, etc., and that capture and collect data from the network traffic or system activities. Sensors then forward the collected data to another component of the intrusion detection system, such as analyzers, for further processing and analysis. The other options are not components of an intrusion detection system that are responsible for collecting data in the form of network packets, log files, or system call traces, but rather different components or techniques that are related to intrusion detection or prevention, such as packet filters (A), analyzers (B), or administration modules C.


質問 # 41
Strong data loss prevention (DLP) solutions help protect information in which of the following states?

  • A. Public restricted, and confidential
  • B. Data sent, data received, and data deleted
  • C. Operating system application and database levels
  • D. At rest, in transit and in use

正解:D

解説:
Explanation
Strong data loss prevention (DLP) solutions help protect information in all states: at rest, in transit and in use.
This is because DLP solutions are technologies or tools that help to prevent unauthorized or accidental disclosure, modification, or deletion of sensitive or confidential information by users or applications. DLP solutions help to protect information in all states, by applying different types of controls or mechanisms depending on the state of the information. For example, DLP solutions can protect information at rest by encrypting or masking the data stored on devices or media; protect information in transit by inspecting or filtering the data transmitted over networks or channels; and protect information in use by restricting or monitoring the access or usage of the data by users or applications. The other options are not states that strong data loss prevention (DLP) solutions help protect information in, but rather different levels (B), classifications C, or actions (D) that are related to information security.


質問 # 42
What is the MAIN consideration when storing backup files?

  • A. Storing copies on-site for ease of access during incident response
  • B. Utilizing solid slate device (SSDJ media for quick recovery
  • C. Protecting the off-site data backup copies from unauthorized access
  • D. Storing backup files on public cloud storage

正解:C

解説:
Explanation
The MAIN consideration when storing backup files is protecting the off-site data backup copies from unauthorized access. This is because protecting the off-site data backup copies from unauthorized access helps to ensure the confidentiality and integrity of the backup data, and prevent any unauthorized or malicious disclosure, modification, or deletion of the backup data. Protecting the off-site data backup copies from unauthorized access also helps to comply with any regulatory or contractual requirements that may apply to the backup data. The other options are not the main consideration when storing backup files, but rather different aspects or factors that affect the backup process, such as using solid state device (SSD) media (A), storing backup files on public cloud storage (B), or storing copies on-site (D).


質問 # 43
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?

  • A. Dependent upon specific regulatory requirements
  • B. Dependent upon the nature of breath
  • C. The service provider
  • D. The organization

正解:D

解説:
Explanation
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service provider's network. From a regulatory perspective, the organization is responsible for the data breach. This is because the organization is the data owner and has the ultimate accountability and liability for the security and privacy of its data, regardless of where it is stored or processed.
The organization cannot transfer or delegate its responsibility to the service provider, even if there is a contractual agreement or service level agreement that specifies the security obligations of the service provider.
The other options are not correct, because they either imply that the service provider is responsible (A), or that the responsibility depends on the nature of breach (B) or specific regulatory requirements C, which are not relevant factors.


質問 # 44
Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

  • A. 60 270042009
  • B. Capability maturity model integration
  • C. Balanced scorecard
  • D. COBIT 5

正解:B

解説:
Explanation
The document that contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness is Capability Maturity Model Integration (CMMI). This is because CMMI is a framework that defines five levels of process maturity, from initial to optimized, and provides best practices and guidelines for improving the quality and effectiveness of processes across different domains, such as software development, service delivery, or cybersecurity. The other options are not documents that contain the essential elements of effective processes and describe an improvement path considering quality and effectiveness, but rather different types of documents or tools that provide guidance or recommendations for implementing policies or controls, such as Balanced Scorecard (B), ISO 27004:2009 C, or COBIT 5 (D).


質問 # 45
In public key cryptography, digital signatures are primarily used to;

  • A. ensure message accuracy.
  • B. ensure message integrity.
  • C. maintain confidentiality.
  • D. prove sender authenticity.

正解:D

解説:
Explanation
In public key cryptography, digital signatures are primarily used to prove sender authenticity. A digital signature is a cryptographic technique that allows the sender of a message to sign it with their private key, which can only be decrypted by their public key. The recipient can verify that the message was sent by the sender and not tampered with by using the sender's public key.


質問 # 46
Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?

  • A. Mobile connectivity could be severely weakened.
  • B. An adversary can predict a user's login credentials.
  • C. A user's behavior pattern can be predicted.
  • D. Authorization tokens could be exploited.

正解:D

解説:
Explanation
The GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode is that authorization tokens could be exploited. Authorization tokens are pieces of data that are used to authenticate users and grant them access to certain resources or services. Authorization tokens are often stored on mobile devices to enable seamless and convenient access without requiring users to enter their credentials repeatedly. However, if users set their mobile devices to "always on" mode, they increase the risk of losing their devices or having them stolen by attackers. Attackers can then access the authorization tokens stored on the devices and use them to impersonate the users or access their sensitive data.


質問 # 47
Using digital evidence to provide validation that an attack has actually occurred is an example of;

  • A. identification.
  • B. extraction.
  • C. data acquisition.
  • D. computer forensic

正解:D

解説:
Explanation
Using digital evidence to provide validation that an attack has actually occurred is an example of computer forensics. This is because computer forensics is a discipline that involves the identification, preservation, analysis, and presentation of digital evidence from various sources, such as computers, networks, mobile devices, etc., to support investigations of cyber incidents or crimes. Computer forensics helps to provide validation that an attack has actually occurred, by examining the digital traces or artifacts left by the attackers on the compromised systems or devices, and by reconstructing the sequence and timeline of events that led to the attack. The other options are not examples of using digital evidence to provide validation that an attack has actually occurred, but rather different techniques or processes that are related to computer forensics, such as extraction (B), identification C, or data acquisition (D).


質問 # 48
Which of the following is EASIEST for a malicious attacker to detect?

  • A. Use of insufficient cryptography
  • B. Ability to tamper with mobile code
  • C. Susceptibility to reverse engineering
  • D. Insecure storage of sensitive data

正解:C

解説:
Explanation
The EASIEST thing for a malicious attacker to detect is the susceptibility to reverse engineering. Reverse engineering is the process of analyzing the code or functionality of an application to understand its structure, logic, or design. Reverse engineering can be used by attackers to discover vulnerabilities, bypass security mechanisms, or modify the application's behavior. Mobile applications are often susceptible to reverse engineering because they are distributed in binary form and can be easily decompiled or disassembled.


質問 # 49
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

  • A. Processes are aligned with industry best practices.
  • B. Processes are updated and documented annually.
  • C. Processes are approved by the process owner.
  • D. Processes are centralized and standardized.

正解:A

解説:
Explanation
The MOST important thing to verify when reviewing the effectiveness of an organization's identity management program is whether the processes are aligned with industry best practices. Identity management is the process of managing the identities and access rights of users across an organization's systems and resources. Industry best practices provide guidelines and standards for how to implement identity management in a secure, efficient, and compliant manner.


質問 # 50
Which of the following BEST characterizes security mechanisms for mobile devices?

  • A. Configurable and reliable across device types
  • B. Comparatively weak relative to workstations
  • C. Easy to control through mobile device management
  • D. Inadequate for organizational use

正解:C

解説:
Explanation
The BEST characteristic that describes security mechanisms for mobile devices is easy to control through mobile device management. This is because mobile device management is a technique that allows organizations to centrally manage and secure mobile devices, such as smartphones, tablets, laptops, etc., that are used by their employees or customers. Mobile device management helps to enforce security policies, configure settings, install applications, monitor usage, wipe data, etc., on mobile devices remotely and efficiently. The other options are not characteristics that describe security mechanisms for mobile devices, but rather different aspects or factors that affect security mechanisms for mobile devices, such as weakness (B), inadequacy C, or reliability (D).


質問 # 51
......

あなたを合格させるCybersecurity Audit Cybersecurity-Audit-Certificate試験問題集で2024年04月26日には77問あります:https://www.jpntest.com/shiken/Cybersecurity-Audit-Certificate-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡