ISC

Area II: Security

176 questions across 5 exams

All questions (176)

Q15Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'preventive' control in the context of network security?

Worked answer available with free account
View question →
Q16Hard1 mark·CPA ISC Practice Exam

A covered entity under HIPAA uses a cloud service to store Patient Health Information (PHI). The cloud provider experiences a data breach where unencrypted PHI is exposed. Under the HIPAA Breach Notification Rule, which of the following actions is REQUIRED?

Worked answer available with free account
View question →
Q17Medium1 mark·CPA ISC Practice Exam

Under the General Data Protection Regulation (GDPR), a 'Data Controller' is defined as:

Worked answer available with free account
View question →
Q18Hard1 mark·CPA ISC Practice Exam

A retailer processes credit card transactions. According to PCI DSS Requirement 3 (Protect stored cardholder data), which of the following data elements is permitted to be stored after authorization, provided it is encrypted?

Worked answer available with free account
View question →
Q19Medium1 mark·CPA ISC Practice Exam

The NIST Cybersecurity Framework (CSF) organizes its Core into five concurrent and continuous functions. Which function includes activities to 'develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services'?

Worked answer available with free account
View question →
Q20Hard1 mark·CPA ISC Practice Exam

An organization is adopting the COBIT 2019 framework. Which of the following is NOT one of the six 'Governance System Principles' of COBIT 2019?

Worked answer available with free account
View question →
Q21Easy1 mark·CPA ISC Practice Exam

A penetration tester is hired to assess a company's external security. The tester sends a deceptive email to the HR department claiming to be an applicant, with a malicious attachment designed to harvest credentials. This type of attack is best classified as:

Worked answer available with free account
View question →
Q22Medium1 mark·CPA ISC Practice Exam

Which of the following authentication methods provides the highest level of security for remote access to a corporate network?

Worked answer available with free account
View question →
Q23Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'Least Privilege' implementation for a database. They find that the 'Reporting_User' role has 'DROP TABLE' permissions. Why is this a control deficiency?

Worked answer available with free account
View question →
Q24Easy1 mark·CPA ISC Practice Exam

Which of the following best describes the concept of 'Defense in Depth'?

Worked answer available with free account
View question →
Q25Medium1 mark·CPA ISC Practice Exam

A service organization is undergoing a SOC 2® engagement. The auditor observes that the organization uses a 'bastion host' or 'jump box' to access the production network. What is the primary security purpose of this component?

Worked answer available with free account
View question →
Q26Medium1 mark·CPA ISC Practice Exam

In the context of encryption, what is the primary difference between symmetric and asymmetric encryption?

Worked answer available with free account
View question →
Q27Medium1 mark·CPA ISC Practice Exam

A company wants to ensure that sensitive emails sent to external clients cannot be read by interceptors. They implement a solution where the sender uses the recipient's public key to encrypt the message. This ensures:

Worked answer available with free account
View question →
Q28Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the incident response plan of a financial institution. The plan states that in the event of a ransomware attack, the first step is to 'Pay the ransom immediately to restore operations.' How should the auditor evaluate this procedure?

Worked answer available with free account
View question →
Q29Hard1 mark·CPA ISC Practice Exam

Which of the following is a key requirement of the NIST Privacy Framework's 'Control' function?

Worked answer available with free account
View question →
Q37Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'corrective' control?

Worked answer available with free account
View question →
Q39Medium1 mark·CPA ISC Practice Exam

An auditor is reviewing the logical access controls for a financial application. They notice that the 'Application Administrator' account is shared by three members of the IT support team. The password is stored in a password vault. What is the primary risk?

Worked answer available with free account
View question →
Q41Easy1 mark·CPA ISC Practice Exam

Under the CIS Controls (Center for Internet Security), Control 1 is 'Inventory and Control of Enterprise Assets'. Why is this considered the foundational control?

Worked answer available with free account
View question →
Q42Medium1 mark·CPA ISC Practice Exam

A company implements a 'Zero Trust' architecture. Which of the following principles is central to this model?

Worked answer available with free account
View question →
Q46Medium1 mark·CPA ISC Practice Exam

A company is subject to GDPR. They wish to use customer data for a new purpose (marketing) that was not disclosed when the data was originally collected. What must they typically do?

Worked answer available with free account
View question →
Q52Hard1 mark·CPA ISC Practice Exam

A company uses 'Tokenization' to protect credit card numbers. How does this differ from Encryption?

Worked answer available with free account
View question →
Q53Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'physical' security control?

Worked answer available with free account
View question →
Q55Hard1 mark·CPA ISC Practice Exam

Which of the following is a requirement of the HIPAA Security Rule but NOT the Privacy Rule?

Worked answer available with free account
View question →
Q57Medium1 mark·CPA ISC Practice Exam

Which of the following best describes 'Static Application Security Testing' (SAST)?

Worked answer available with free account
View question →
Q58Hard1 mark·CPA ISC Practice Exam

An auditor observes that a company uses 'Symmetric' encryption for transmitting large database backups across a public network. The key exchange is handled via a separate secure channel. Is this appropriate?

Worked answer available with free account
View question →
Q59Medium1 mark·CPA ISC Practice Exam

In the context of COBIT 2019, what is the purpose of the 'Goals Cascade'?

Worked answer available with free account
View question →
Q60Medium1 mark·CPA ISC Practice Exam

A company uses a 'Biometric' authentication system. The 'False Acceptance Rate' (FAR) is set to 0.01%. What does this mean?

Worked answer available with free account
View question →
Q62Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'Logical' access control?

Worked answer available with free account
View question →
Q66Easy1 mark·CPA ISC Practice Exam

Under the NIST Cybersecurity Framework, 'Recovery Planning' falls under which function?

Worked answer available with free account
View question →
Q67Medium1 mark·CPA ISC Practice Exam

A company stores customer passwords in a database. To protect them, they use a hashing algorithm. Which additional technique should be applied to prevent 'Rainbow Table' attacks?

Worked answer available with free account
View question →
Q69Easy1 mark·CPA ISC Practice Exam

Which of the following is a 'Social Engineering' technique where the attacker waits for an authorized user to pass through a secure door and then follows them inside?

Worked answer available with free account
View question →
Q78Medium1 mark·CPA ISC Practice Exam

A company uses a 'Public Key Infrastructure' (PKI). What is the role of the 'Certificate Authority' (CA)?

Worked answer available with free account
View question →
Q79Easy1 mark·CPA ISC Practice Exam

An auditor is reviewing the 'Incident Response' log. They see an entry: 'Server detected high CPU usage. Investigation showed it was a scheduled backup. Ticket closed.' Was this an 'Incident'?

Worked answer available with free account
View question →
Q80Hard1 mark·CPA ISC Practice Exam

Which of the following is a requirement of PCI DSS Requirement 11 (Regularly test security systems and processes)?

Worked answer available with free account
View question →
Q82Hard1 mark·CPA ISC Practice Exam

Which of the following is the MOST effective method to prevent 'SQL Injection' attacks in a web application?

Worked answer available with free account
View question →
Q05Medium1 mark·CPA ISC Practice Exam 2

Which of the following entities is considered a 'Covered Entity' under the HIPAA Privacy Rule?

Worked answer available with free account
View question →
Q06Medium1 mark·CPA ISC Practice Exam 2

Under GDPR, which principle requires that personal data be adequate, relevant, and limited to what is necessary in relation to the purposes for which they are processed?

Worked answer available with free account
View question →

An organization uses a 'defense-in-depth' strategy. Which of the following best represents this approach?

Worked answer available with free account
View question →
Q11Medium1 mark·CPA ISC Practice Exam 2

Which NIST Cybersecurity Framework (CSF) function includes the category 'Recovery Planning'?

Worked answer available with free account
View question →

A company processes credit card transactions. Which standard is MOST applicable to their environment?

Worked answer available with free account
View question →
Q14Medium1 mark·CPA ISC Practice Exam 2

Which type of attack involves an attacker inserting malicious code into a website's input field to manipulate the backend database?

Worked answer available with free account
View question →

Which of the following is a detective control?

Worked answer available with free account
View question →
Q17Medium1 mark·CPA ISC Practice Exam 2

In the context of CIS Controls, what is the primary purpose of 'Inventory and Control of Enterprise Assets' (Control 1)?

Worked answer available with free account
View question →

Which encryption method uses a pair of keys: a public key for encryption and a private key for decryption?

Worked answer available with free account
View question →

Which NIST Special Publication provides a catalog of security and privacy controls for federal information systems?

Worked answer available with free account
View question →
Q26Medium1 mark·CPA ISC Practice Exam 2

Which of the following best describes 'Tokenization'?

Worked answer available with free account
View question →
Q27Medium1 mark·CPA ISC Practice Exam 2

A healthcare provider stores patient records in a cloud database. Which HIPAA rule specifically governs the technical safeguards (like encryption and access control) for this electronic Protected Health Information (ePHI)?

Worked answer available with free account
View question →

A company uses a biometric scanner for server room access. This is an example of which authentication factor?

Worked answer available with free account
View question →

In the context of COBIT 2019, which of the following is a 'Governance Objective' rather than a 'Management Objective'?

Worked answer available with free account
View question →

Which of the following is a 'Corrective' control?

Worked answer available with free account
View question →
Q36Medium1 mark·CPA ISC Practice Exam 2

A company is subject to GDPR. A data breach occurs involving unencrypted personal data of 5,000 customers. Within what timeframe must the company generally notify the supervisory authority?

Worked answer available with free account
View question →
Q37Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing the 'User Access Review' control. The policy states reviews happen quarterly. The auditor finds that for Q2, the review was signed off by the same person who has administrative rights to grant access. What is the risk?

Worked answer available with free account
View question →
Q41Medium1 mark·CPA ISC Practice Exam 2

Which phase of the Cyber Kill Chain involves transmitting the weaponized code to the target environment (e.g., via email attachment)?

Worked answer available with free account
View question →

Which of the following is a primary benefit of using a 'VPN' (Virtual Private Network) for remote employees?

Worked answer available with free account
View question →

Which NIST Privacy Framework function includes the category 'Data Processing Management'?

Worked answer available with free account
View question →
Q48Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a 'Preventive' control?

Worked answer available with free account
View question →

Under the HIPAA Security Rule, 'Encryption' is classified as an 'Addressable' implementation specification. What does 'Addressable' mean?

Worked answer available with free account
View question →

Which of the following is a 'Social Engineering' attack?

Worked answer available with free account
View question →

Which of the following is a 'Physical' security control?

Worked answer available with free account
View question →
Q56Medium1 mark·CPA ISC Practice Exam 2

A company stores customer passwords in a database. To enhance security, they add a random string of characters to each password before hashing it. This technique is known as:

Worked answer available with free account
View question →

What is the primary purpose of a 'DDoS' (Distributed Denial of Service) attack?

Worked answer available with free account
View question →
Q59Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing the 'Incident Response Plan'. Which phase should occur immediately after 'Containment'?

Worked answer available with free account
View question →

Which of the following is a 'Logical' access control?

Worked answer available with free account
View question →
Q62Medium1 mark·CPA ISC Practice Exam 2

Which GDPR right allows an individual to request that their personal data be sent to them or another controller in a structured, commonly used, and machine-readable format?

Worked answer available with free account
View question →
Q66Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a key principle of 'Zero Trust' architecture?

Worked answer available with free account
View question →

Which COBIT 2019 component describes the rules, regulations, and policies that the enterprise must comply with?

Worked answer available with free account
View question →
Q72Medium1 mark·CPA ISC Practice Exam 2

An auditor is testing 'Logical Access'. They find a user with the role 'SuperAdmin'. This user is also the 'HR Manager'. What is the primary concern?

Worked answer available with free account
View question →

A company uses 'Ransomware' insurance. This is an example of which risk response strategy?

Worked answer available with free account
View question →
Q75Medium1 mark·CPA ISC Practice Exam 2

Which of the following is a 'Data Loss Prevention' (DLP) control?

Worked answer available with free account
View question →

Which of the following is a 'Symmetric' encryption algorithm?

Worked answer available with free account
View question →
Q80Medium1 mark·CPA ISC Practice Exam 2

An auditor is reviewing the 'Termination' process. They find that while network access is revoked immediately, physical access cards are often collected weeks later. What is the risk?

Worked answer available with free account
View question →
Q82Medium1 mark·CPA ISC Practice Exam 2

An auditor finds that a company's 'Incident Response Plan' has not been tested or updated in 3 years. What is the primary recommendation?

Worked answer available with free account
View question →
Q07Medium1 mark·CPA ISC Practice Exam 3

A healthcare provider stores patient records in a data warehouse. To comply with HIPAA while allowing data analysts to study demographic trends, the organization replaces patient names with unique alphanumeric codes that can be mapped back to the original data only by the database administrator. This technique is known as:

Worked answer available with free account
View question →
Q08Medium1 mark·CPA ISC Practice Exam 3

Under the General Data Protection Regulation (GDPR), a data subject requests that a company transmit their personal data directly to another service provider. This request falls under which specific right?

Worked answer available with free account
View question →
Q12Medium1 mark·CPA ISC Practice Exam 3

Which of the following NIST Cybersecurity Framework (CSF) functions is PRIMARILY associated with the implementation of safeguards to ensure delivery of critical infrastructure services, such as Access Control and Awareness Training?

Worked answer available with free account
View question →
Q13Medium1 mark·CPA ISC Practice Exam 3

A retailer processes credit card transactions. They have segmented their network so that the Cardholder Data Environment (CDE) is isolated from the corporate Wi-Fi network. According to PCI DSS, what is the primary benefit of this segmentation?

Worked answer available with free account
View question →
Q14Medium1 mark·CPA ISC Practice Exam 3

An organization uses a 'Defense in Depth' strategy. Which of the following represents a correct layering of controls from the perimeter inward?

Worked answer available with free account
View question →

In the context of COBIT 2019, which of the following best describes the distinction between Governance and Management?

Worked answer available with free account
View question →
Q19Medium1 mark·CPA ISC Practice Exam 3

A company implements a 'Zero Trust' architecture. Which of the following principles is central to this approach?

Worked answer available with free account
View question →

Which of the following is a primary responsibility of the 'Data Controller' under GDPR?

Worked answer available with free account
View question →

A company is subject to HIPAA. An employee loses a company laptop containing unencrypted ePHI (electronic Protected Health Information). Under the HIPAA Breach Notification Rule, what is the immediate requirement if the breach affects more than 500 individuals?

Worked answer available with free account
View question →

Which of the following is a characteristic of a 'Symmetric' encryption algorithm?

Worked answer available with free account
View question →

Which of the following is an example of a 'Preventive' control?

Worked answer available with free account
View question →

An auditor is reviewing a client's compliance with the NIST Privacy Framework. The client has a process to 'notify individuals about how their data is collected and used'. This aligns with which Function of the NIST Privacy Framework?

Worked answer available with free account
View question →

A company uses a 'Phishing Simulation' to test employees. This is primarily a test of which security domain?

Worked answer available with free account
View question →
Q33Medium1 mark·CPA ISC Practice Exam 3

Which of the following describes a 'Logic Bomb'?

Worked answer available with free account
View question →

Which of the following is a key requirement of the HIPAA Security Rule but NOT the Privacy Rule?

Worked answer available with free account
View question →
Q37Medium1 mark·CPA ISC Practice Exam 3

An auditor is reviewing a firewall configuration. They see a rule at the bottom of the Access Control List (ACL) that says 'DENY ALL'. What is this practice called?

Worked answer available with free account
View question →
Q40Medium1 mark·CPA ISC Practice Exam 3

An auditor is testing the 'Logical Access' controls for an ERP system. They select a sample of new employees and verify that their access rights were approved by a manager. This test is designed to validate which assertion?

Worked answer available with free account
View question →

An organization discovers a vulnerability in their web server software. The vendor has released a patch, but the organization cannot apply it immediately due to compatibility issues with a legacy application. What is the BEST temporary course of action?

Worked answer available with free account
View question →

Which of the following statements accurately describes the 'Integrity' component of the CIA Triad?

Worked answer available with free account
View question →
Q45Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a 'Corrective' control?

Worked answer available with free account
View question →

An auditor is reviewing a database schema. They notice that the 'SocialSecurityNumber' column is stored in cleartext. Which control is missing?

Worked answer available with free account
View question →

A company uses a biometric fingerprint scanner and a PIN code for server room access. What type of authentication is this?

Worked answer available with free account
View question →
Q49Medium1 mark·CPA ISC Practice Exam 3

Which CIS Control is typically prioritized as Control #1 because you cannot protect what you do not know you have?

Worked answer available with free account
View question →

An auditor is reviewing the 'Incident Response Plan'. The plan includes a step for 'Containment'. What is the primary goal of this phase?

Worked answer available with free account
View question →

Which of the following attacks involves an attacker intercepting communication between two parties and relaying messages between them?

Worked answer available with free account
View question →

A company uses 'Asymmetric' encryption for secure email. If Alice wants to send a confidential email to Bob that only Bob can read, which key does she use to encrypt it?

Worked answer available with free account
View question →

Which of the following is a 'Detective' control?

Worked answer available with free account
View question →
Q57Medium1 mark·CPA ISC Practice Exam 3

Under COBIT 2019, which component of the governance system describes the 'rules of the game'?

Worked answer available with free account
View question →

A company wants to implement a 'Least Privilege' model for its cloud storage buckets. What does this entail?

Worked answer available with free account
View question →
Q61Medium1 mark·CPA ISC Practice Exam 3

A company is designing a new data center. They install a 'Biometric Mantrap' at the entrance. What is the purpose of this control?

Worked answer available with free account
View question →
Q64Medium1 mark·CPA ISC Practice Exam 3

A company is implementing a 'Data Loss Prevention' (DLP) solution. Which of the following is a primary function of DLP?

Worked answer available with free account
View question →

Which of the following is a characteristic of 'Ransomware'?

Worked answer available with free account
View question →

A company uses a 'VPN' (Virtual Private Network) for remote employees. What is the primary security function of the VPN?

Worked answer available with free account
View question →

An auditor is testing the 'Termination' process. They find that a terminated employee's Active Directory account was disabled 5 days after their departure. The policy states 'Immediate' (within 24 hours). What is the risk?

Worked answer available with free account
View question →
Q71Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a requirement of the 'NIST SP 800-53' framework?

Worked answer available with free account
View question →
Q72Medium1 mark·CPA ISC Practice Exam 3

A company uses 'Input Validation' on its web forms. Which attack does this primarily prevent?

Worked answer available with free account
View question →

What is the difference between 'Authentication' and 'Authorization'?

Worked answer available with free account
View question →
Q77Medium1 mark·CPA ISC Practice Exam 3

Which of the following is a 'Social Engineering' technique?

Worked answer available with free account
View question →

A company uses 'Role-Based Access Control' (RBAC). How are permissions assigned?

Worked answer available with free account
View question →
Q81Medium1 mark·CPA ISC Practice Exam 3

A company uses 'Hashing' to store passwords. Why is this better than encryption?

Worked answer available with free account
View question →

A healthcare provider stores patient records in a cloud database. To comply with HIPAA, they must ensure that even if the database storage media is stolen, the data remains unreadable. Which control is MOST appropriate to address this specific risk?

Worked answer available with free account
View question →

Under the General Data Protection Regulation (GDPR), a data subject requests that a company delete all their personal data. The company refuses because the data is required to be retained by tax laws. Which GDPR principle allows the company to refuse this request?

Worked answer available with free account
View question →

An auditor is evaluating a company's compliance with PCI DSS Requirement 3 (Protect stored cardholder data). The auditor finds that the Primary Account Number (PAN) is displayed in full on the customer service representative's screen. Which specific control is missing?

Worked answer available with free account
View question →

Which component of the NIST Cybersecurity Framework (CSF) focuses on developing and implementing the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event?

Worked answer available with free account
View question →

An attacker sends an email to the HR department with an attachment named 'Payroll_Update.exe' that looks like a PDF icon. When clicked, it installs software that logs keystrokes. Which stage of the cyber-attack lifecycle does the 'clicking of the attachment' represent?

Worked answer available with free account
View question →

A company implements a 'Zero Trust' architecture. Which of the following principles is central to this approach?

Worked answer available with free account
View question →

Which of the following is a key principle of the COBIT 2019 governance framework?

Worked answer available with free account
View question →

A company is subject to HIPAA. An employee loses a company laptop containing unencrypted ePHI (electronic Protected Health Information) of 600 patients. Under the HIPAA Breach Notification Rule, which of the following actions is REQUIRED?

Worked answer available with free account
View question →

Which of the following best describes the 'Integrity' component of the CIA Triad in information security?

Worked answer available with free account
View question →

Which of the following authentication methods is considered 'Something you are'?

Worked answer available with free account
View question →

Which CIS Control focuses on 'Inventory and Control of Enterprise Assets'?

Worked answer available with free account
View question →

In the context of NIST SP 800-53, what does the term 'Control Baseline' refer to?

Worked answer available with free account
View question →

An auditor is testing a client's firewall configuration. They notice a rule that allows 'Any' source IP to access the database port (1433) directly from the internet. Which security principle is violated?

Worked answer available with free account
View question →

Which of the following scenarios describes a 'Phishing' attack?

Worked answer available with free account
View question →

What is the primary purpose of a 'VPN' (Virtual Private Network) for remote employees?

Worked answer available with free account
View question →

A company wants to ensure that their cloud provider cannot access their sensitive data, even if the provider is subpoenaed. Which control achieves this?

Worked answer available with free account
View question →

An auditor is reviewing the 'Incident Response Plan'. Which phase of incident response involves removing the threat from the environment (e.g., deleting malware, disabling breached accounts)?

Worked answer available with free account
View question →

Which of the following is an example of a 'Detective' control?

Worked answer available with free account
View question →

A company processes credit card payments. Which standard MUST they comply with?

Worked answer available with free account
View question →

A company uses 'Asymmetric Encryption' for secure email. If User A wants to send a confidential message to User B, which key should User A use to encrypt the message?

Worked answer available with free account
View question →

An auditor observes that a company uses 'Hashing' to store passwords. Why is hashing preferred over encryption for password storage?

Worked answer available with free account
View question →

Which of the following is a 'Physical' threat to information systems?

Worked answer available with free account
View question →

A company implements 'Data Loss Prevention' (DLP) software. Which of the following actions would the DLP system most likely block?

Worked answer available with free account
View question →

Which of the following is a 'Nation-State' threat actor most likely to target?

Worked answer available with free account
View question →

Under GDPR, which role determines the 'purposes and means' of processing personal data?

Worked answer available with free account
View question →

A company uses 'Tokenization' for credit card numbers. What is the primary benefit of tokenization over encryption for the merchant?

Worked answer available with free account
View question →

Which NIST framework is specifically designed to help organizations manage privacy risks?

Worked answer available with free account
View question →

A company uses 'Symmetric Encryption'. Which of the following is a major challenge associated with this method?

Worked answer available with free account
View question →

An auditor is reviewing the 'Incident Response' logs. They see a 'False Positive'. What does this mean?

Worked answer available with free account
View question →

Which of the following is a 'Preventive' control for 'SQL Injection'?

Worked answer available with free account
View question →

Which of the following is an example of 'Social Engineering'?

Worked answer available with free account
View question →

An auditor is reviewing the 'Data Retention Policy'. The policy states that customer data is deleted after 7 years. However, the auditor finds backups containing 10-year-old data. This is a violation of which GDPR principle?

Worked answer available with free account
View question →
Q31Medium1 mark·CPA ISC Practice Exam 5

Under the HIPAA Security Rule, which of the following is a 'Covered Entity'?

Worked answer available with free account
View question →

A European customer requests that a US-based company delete all their personal data. Under GDPR, this is known as:

Worked answer available with free account
View question →

Which PCI DSS requirement falls under the goal of 'Protect Cardholder Data'?

Worked answer available with free account
View question →
Q34Medium1 mark·CPA ISC Practice Exam 5

The NIST Cybersecurity Framework (CSF) is organized into five core functions. Which function involves developing and implementing the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event?

Worked answer available with free account
View question →

Which component of COBIT 2019 describes the 'Governance System'?

Worked answer available with free account
View question →
Q36Medium1 mark·CPA ISC Practice Exam 5

According to the CIS Controls v8, what is Control 1 (the most foundational control)?

Worked answer available with free account
View question →
Q37Medium1 mark·CPA ISC Practice Exam 5

NIST Special Publication 800-53 is primarily designed for:

Worked answer available with free account
View question →

Which part of the NIST Privacy Framework helps organizations determine their current privacy posture and their target state?

Worked answer available with free account
View question →

An employee receives an email appearing to be from the CEO asking for an urgent wire transfer. The email address is slightly misspelled. This is an example of:

Worked answer available with free account
View question →
Q40Medium1 mark·CPA ISC Practice Exam 5

A web application allows users to input text into a comment field. A malicious user enters a script that executes in the browsers of other users viewing the comment. This is known as:

Worked answer available with free account
View question →
Q41Medium1 mark·CPA ISC Practice Exam 5

Which stage of the 'Cyber Kill Chain' involves the attacker installing a backdoor or remote access trojan (RAT) to maintain access?

Worked answer available with free account
View question →

What is the primary purpose of a Distributed Denial of Service (DDoS) attack?

Worked answer available with free account
View question →
Q43Medium1 mark·CPA ISC Practice Exam 5

Which of the following is a characteristic of an 'Advanced Persistent Threat' (APT)?

Worked answer available with free account
View question →
Q44Medium1 mark·CPA ISC Practice Exam 5

An organization implements a 'Zero Trust' architecture. Which principle is central to this approach?

Worked answer available with free account
View question →

Which authentication factor is represented by a fingerprint scan?

Worked answer available with free account
View question →
Q46Medium1 mark·CPA ISC Practice Exam 5

A network administrator separates the Finance department's network traffic from the Engineering department's traffic using VLANs. This is an example of:

Worked answer available with free account
View question →
Q47Medium1 mark·CPA ISC Practice Exam 5

Which security device is primarily designed to detect and block malicious traffic patterns or signatures in real-time?

Worked answer available with free account
View question →

In an Identity and Access Management (IAM) system, 'Role-Based Access Control' (RBAC) assigns permissions based on:

Worked answer available with free account
View question →
Q49Medium1 mark·CPA ISC Practice Exam 5

Which cryptographic concept ensures that a message has not been altered in transit?

Worked answer available with free account
View question →
Q50Medium1 mark·CPA ISC Practice Exam 5

An auditor is reviewing the results of a penetration test. The report identifies a 'Critical' vulnerability involving an unpatched server exposed to the internet. What is the auditor's most appropriate next step?

Worked answer available with free account
View question →
Q51Medium1 mark·CPA ISC Practice Exam 5

What is the primary difference between Vulnerability Scanning and Penetration Testing?

Worked answer available with free account
View question →

During a security walkthrough, an auditor notices that employees are writing passwords on sticky notes attached to their monitors. Which control is failing?

Worked answer available with free account
View question →

Which type of security test involves the tester having full knowledge of the system (network diagrams, source code, IP addresses) beforehand?

Worked answer available with free account
View question →
Q54Medium1 mark·CPA ISC Practice Exam 5

A company replaces sensitive credit card numbers in their database with a random string of characters that has no mathematical relationship to the original number. The mapping is stored in a secure vault. This technique is called:

Worked answer available with free account
View question →
Q55Medium1 mark·CPA ISC Practice Exam 5

Which encryption type uses a public key to encrypt and a private key to decrypt?

Worked answer available with free account
View question →
Q56Medium1 mark·CPA ISC Practice Exam 5

Data Loss Prevention (DLP) tools are primarily designed to:

Worked answer available with free account
View question →

What is the difference between Confidentiality and Privacy?

Worked answer available with free account
View question →

Which phase of the data lifecycle involves securely removing data when it is no longer needed?

Worked answer available with free account
View question →
Q59Medium1 mark·CPA ISC Practice Exam 5

In Incident Response, what is the primary goal of the 'Containment' phase?

Worked answer available with free account
View question →

A company purchases cyber insurance. Which risk management strategy is this?

Worked answer available with free account
View question →
Q61Medium1 mark·CPA ISC Practice Exam 5

What is the difference between an 'Event' and an 'Incident' in cybersecurity?

Worked answer available with free account
View question →
Q62Medium1 mark·CPA ISC Practice Exam 5

After a ransomware attack is resolved, the team holds a 'Lessons Learned' meeting. What is the primary output of this meeting?

Worked answer available with free account
View question →

Practice these questions with detailed guidance

Full answers, grading, and explanations on why each answer is correct.