[Q40-Q57] リアル試験問題Cybersecurity-Audit-Certificate問題集試験問題はここにある [2023年11月]

Share

リアル試験問題Cybersecurity-Audit-Certificate問題集試験問題はここにある [2023年11月]

最新の2023年11月効果的なCybersecurity-Audit-Certificateテスト問題を使って合格突破

質問 # 40
The protection of information from unauthorized access or disclosure is known as:

  • A. access control.
  • B. media protect on.
  • C. cryptograph
  • D. confidentiality.

正解:D

解説:
Explanation
The protection of information from unauthorized access or disclosure is known as confidentiality. This is because confidentiality is one of the three main objectives of information security, along with integrity and availability. Confidentiality ensures that information is accessible and readable only by those who are authorized and intended to do so, and prevents unauthorized or accidental exposure of information to unauthorized parties. The other options are not the protection of information from unauthorized access or disclosure, but rather different concepts or techniques that are related to information security, such as access control (A), cryptography (B), or media protection C.


質問 # 41
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?

  • A. It is higher speed.
  • B. It is more cost effective.
  • C. It is more secure
  • D. It is more reliable

正解:B

解説:
Explanation
The GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers is that it is more cost effective. This is because a VPN is a technology that creates a secure and encrypted connection between a client and a server over an existing public network, such as the Internet. A VPN reduces the cost of establishing and maintaining a secure communication channel, as it does not require any additional hardware, software, or infrastructure, unlike dedicated circuits and dial-in servers, which require dedicated lines, modems, routers, switches, etc. The other options are not the greatest advantage of using a VPN over dedicated circuits and dial-in servers, because they either involve security (A), reliability (B), or speed C aspects that may not be significantly different or better than dedicated circuits and dial-in servers.


質問 # 42
Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?

  • A. Adversarial threat event
  • B. Exfiltration attack vector
  • C. Infiltration attack vector
  • D. Kill chain modeling

正解:B

解説:
Explanation
An example of an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks is an exfiltration attack vector. An exfiltration attack vector is a method or channel that an APT uses to transfer data from a compromised system or network to an external location. Examples of exfiltration attack vectors include email, FTP, DNS, HTTP, or covert channels.


質問 # 43
The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

  • A. risk quantification
  • B. risk aggregation.
  • C. risk elimination.
  • D. risk prioritization.

正解:D

解説:
Explanation
The GREATEST advantage of using a common vulnerability scoring system is that it helps with risk prioritization. This is because a common vulnerability scoring system provides a standardized and consistent way of measuring and comparing the severity of vulnerabilities, based on their impact and exploitability. This allows organizations to prioritize the remediation of the most critical vulnerabilities and allocate resources accordingly. The other options are not as advantageous as using a common vulnerability scoring system, because they either involve aggregating (A), eliminating C, or quantifying (D) risk, which are not directly related to the scoring system.


質問 # 44
What is the MAIN consideration when storing backup files?

  • A. Protecting the off-site data backup copies from unauthorized access
  • B. Utilizing solid slate device (SSDJ media for quick recovery
  • C. Storing copies on-site for ease of access during incident response
  • D. Storing backup files on public cloud storage

正解:A

解説:
Explanation
The MAIN consideration when storing backup files is protecting the off-site data backup copies from unauthorized access. This is because protecting the off-site data backup copies from unauthorized access helps to ensure the confidentiality and integrity of the backup data, and prevent any unauthorized or malicious disclosure, modification, or deletion of the backup data. Protecting the off-site data backup copies from unauthorized access also helps to comply with any regulatory or contractual requirements that may apply to the backup data. The other options are not the main consideration when storing backup files, but rather different aspects or factors that affect the backup process, such as using solid state device (SSD) media (A), storing backup files on public cloud storage (B), or storing copies on-site (D).


質問 # 45
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?

  • A. Processes are centralized and standardized.
  • B. Processes are updated and documented annually.
  • C. Processes are approved by the process owner.
  • D. Processes are aligned with industry best practices.

正解:D

解説:
Explanation
The MOST important thing to verify when reviewing the effectiveness of an organization's identity management program is whether the processes are aligned with industry best practices. Identity management is the process of managing the identities and access rights of users across an organization's systems and resources. Industry best practices provide guidelines and standards for how to implement identity management in a secure, efficient, and compliant manner.


質問 # 46
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?

  • A. Zero-day vulnerability
  • B. SQL injection vulnerability
  • C. Cross-site scripting vulnerability
  • D. Memory leakage vulnerability

正解:A

解説:
Explanation
A computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability is a zero-day vulnerability. This is because a zero-day vulnerability is a type of vulnerability that has not been reported or disclosed to the public or to the software vendor yet, and may be exploited by attackers before it is patched or fixed. A zero-day vulnerability poses a high risk to systems and applications that are affected by it, as there may be no known defense or solution against it. The other options are not computer-software vulnerabilities that are unknown to those who would be interested in mitigating the vulnerability, but rather types of vulnerabilities that are known and reported to the public or to the software vendor, such as cross-site scripting vulnerability (A), SQL injection vulnerability (B), or memory leakage vulnerability C.


質問 # 47
Which of the following is a feature of an intrusion detection system (IDS)?

  • A. Back doors into applications
  • B. Intrusion prevention
  • C. Automated response
  • D. Interface with firewalls

正解:C

解説:
Explanation
A feature of an intrusion detection system (IDS) is automated response. This is because an IDS is a system that monitors network or system activities for malicious or anomalous behavior, and alerts or reports on any detected incidents. An IDS can also perform automated response actions, such as blocking traffic, terminating sessions, or sending notifications, to contain or mitigate the incidents. The other options are not features of an IDS, but rather different concepts or techniques that are related to intrusion detection or prevention, such as intrusion prevention (A), interface with firewalls C, or back doors into applications (D).


質問 # 48
Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?

  • A. Business process re-engineering
  • B. Business dependency assessment
  • C. Comprehensive cyber insurance procurement
  • D. Single classification level allocation

正解:B

解説:
Explanation
The BEST basis for allocating proportional protection activities when comprehensive classification is not feasible is a business dependency assessment. This is because a business dependency assessment helps to identify the criticality and sensitivity of business processes and their supporting assets, based on their contribution to the organization's objectives and value proposition. This allows for prioritizing protection activities according to the level of risk and impact. The other options are not as effective as a business dependency assessment, because they either use a single classification level allocation (A), which does not account for different levels of risk and impact; require a significant amount of time and resources to perform a business process re-engineering (B); or rely on external parties to cover potential losses without reducing the likelihood or impact of incidents (D).


質問 # 49
Which of the following is an example of an application security control?

  • A. User security awareness training
  • B. Security operations center
  • C. Secure coding
  • D. Intrusion detection

正解:C

解説:
Explanation
An example of an application security control is secure coding. Secure coding is the practice of developing software applications that follow security principles and standards to prevent or mitigate common vulnerabilities and risks. Secure coding involves applying techniques such as input validation, output encoding, error handling, encryption, and testing.


質問 # 50
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?

  • A. Security training and awareness
  • B. Security operations center (SOC)
  • C. Security information and event management (SEM)
  • D. demit/ and access management (1AM)

正解:B

解説:
Explanation
A security operations center (SOC) is a centralized unit that monitors, detects, analyzes, and responds to cyber threats and incidents in real time. A SOC enables continuous identification and mitigation of security threats to an organization by using various tools, processes, and expertise.


質問 # 51
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

  • A. Allocating a significant amount of budget to security investments
  • B. Adopting industry security standards and frameworks
  • C. Establishing metrics to measure and monitor security performance
  • D. Conducting annual security awareness training for all employees

正解:C

解説:
Explanation
The MOST critical thing to guiding and managing security activities throughout an organization to ensure objectives are met is establishing metrics to measure and monitor security performance. This is because metrics provide quantifiable and objective data that can be used to evaluate the effectiveness and efficiency of security activities, as well as identify gaps and areas for improvement. Metrics also enable communication and reporting of security performance to stakeholders, such as senior management, board members, auditors, regulators, customers, etc. The other options are not as critical as establishing metrics, because they either involve spending money without knowing the return on investment (A), adopting standards without customizing them to fit the organization's context and needs (B), or conducting training without assessing its impact on behavior change (D).


質問 # 52
Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?

  • A. Cybersecurity operations management
  • B. Cybersecurity risk scenarios
  • C. Cybercrime, hacktism. and espionage
  • D. Industry-specific security regulator

正解:C

解説:
Explanation
Cyber threat intelligence aims to research and analyze trends and technical developments in the areas of cybercrime, hacktivism, and espionage. These are the main sources of malicious cyber activities that pose risks to organizations and individuals. Cyber threat intelligence helps to understand the motivations, capabilities, tactics, techniques, and procedures of various threat actors and groups.


質問 # 53
Which of the following is an objective of public key infrastructure (PKI)?

  • A. Creating the private-public key pair for secure communications
  • B. Securely distributing secret keys to the communicating parties
  • C. Independently authenticating the validity of the sender's public key
  • D. Approving the algorithm to be used during data transmission

正解:C

解説:
Explanation
An objective of public key infrastructure (PKI) is to independently authenticate the validity of the sender's public key. PKI is a system that uses cryptographic keys to secure communications and transactions. PKI involves a trusted third party called a certificate authority (CA) that issues digital certificates that link a public key with an identity. The recipient can use the CA's public key to verify the sender's certificate and public key.


質問 # 54
The "recover" function of the NISI cybersecurity framework is concerned with:

  • A. identifying critical data to be recovered m case of a security incident.
  • B. allocating costs incurred as part of the implementation of cybersecurity measures.
  • C. taking appropriate action to contain and eradicate a security incident.
  • D. planning for resilience and timely repair of compromised capacities and service.

正解:D

解説:
Explanation
The "recover" function of the NIST cybersecurity framework is concerned with planning for resilience and timely repair of compromised capacities and service. This is because the recover function helps organizations to restore normal operations as quickly as possible after a cybersecurity incident, while also learning from the incident and improving their security posture. The other options are not part of the recover function, but rather belong to the identify (B), respond C, or protect (D) functions.


質問 # 55
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?

  • A. Determine if the cybersecurity program is mapped to relevant legal and regulatory requirements.
  • B. Determine if there is a formal process to review changes in legal and regulatory requirements.
    D Obtain a list of relevant legal and regulatory requirements.
  • C. Review the most recent legal and regulatory audit report conducted by an independent party.

正解:A

解説:
Explanation
The FIRST thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization is to determine if the cybersecurity program is mapped to relevant legal and regulatory requirements. This is because mapping the cybersecurity program to relevant legal and regulatory requirements helps to ensure that the organization has identified and addressed all the applicable laws and regulations that affect its cybersecurity posture, such as data protection, privacy, breach notification, etc. Mapping the cybersecurity program to relevant legal and regulatory requirements also helps to evaluate the alignment and compliance of the organization's cybersecurity policies, procedures, controls, and practices with the legal and regulatory requirements. The other options are not the first thing that an IS auditor should do to ensure cyber security-related legal and regulatory requirements are followed by an organization, but rather follow after determining if the cybersecurity program is mapped to relevant legal and regulatory requirements, such as reviewing the most recent legal and regulatory audit report (B), determining if there is a formal process to review changes in legal and regulatory requirements C, or obtaining a list of relevant legal and regulatory requirements (D).


質問 # 56
Which of the following backup procedure would only copy files that have changed since the last backup was made?

  • A. Daily backup
  • B. Incremental backup
  • C. Full backup
  • D. Differential backup

正解:B

解説:
Explanation
The backup procedure that would only copy files that have changed since the last backup was made is an incremental backup. This is because an incremental backup is a type of backup that only copies the files that have been created or modified since the previous backup, whether it was a full or an incremental backup. An incremental backup helps to reduce the backup time and storage space, as well as the recovery time, as only the changed files need to be restored. The other options are not backup procedures that would only copy files that have changed since the last backup was made, but rather different types of backup procedures that copy files based on different criteria, such as daily backup (B), differential backup C, or full backup (D).


質問 # 57
......

正真正銘で最適な資料Cybersecurity-Audit-Certificateオンライン練習試験:https://www.jpntest.com/shiken/Cybersecurity-Audit-Certificate-mondaishu

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡