New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 1 Question 16 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 16
Topic #: 1
[All Cybersecurity-Audit-Certificate Questions]

Contribute your Thoughts:

0/2000 characters
Jaclyn
3 months ago
Physical theft? That's a bit old school, isn't it?
upvoted 0 times
...
Kerry
3 months ago
I’d say C is also a big deal. Insider threats are sneaky!
upvoted 0 times
...
Felicia
3 months ago
Wait, are we sure about that? I thought it was more about malware and phishing.
upvoted 0 times
...
Tammara
4 months ago
Totally agree with A! Ingress and egress are key.
upvoted 0 times
...
Allene
4 months ago
I think it's A and D. Those are the main ones!
upvoted 0 times
...
Mitsue
4 months ago
I vaguely recall that physical theft could be an attack vector too, but it feels different from the others listed here.
upvoted 0 times
...
Loren
4 months ago
Insider threats definitely seem like a type of attack vector, but I'm not confident about the second one. Was it privilege misuse?
upvoted 0 times
...
Hermila
4 months ago
I feel like I've seen a question about malware and phishing before, but I can't recall if those are the main types of attack vectors.
upvoted 0 times
...
Elbert
5 months ago
I think I remember something about ingress and egress being related to data flow, but I'm not entirely sure if they count as attack vectors.
upvoted 0 times
...
Huey
5 months ago
I remember learning about this in class. The two main types of attack vectors are ingress and egress. Ingress is attacks coming into the network, and egress is attacks going out of the network. I'm pretty confident that's the right answer.
upvoted 0 times
...
Val
5 months ago
Okay, let me see. The question is asking about the two main types of attack vectors in network communications. I'm thinking it's probably physical theft/loss and insider/privilege misuse, since those are common ways networks can be compromised. But I'm not 100% sure.
upvoted 0 times
...
Elbert
5 months ago
This one seems pretty straightforward. I'm pretty confident I know the answer - it's got to be ingress and egress.
upvoted 0 times
...
Glendora
5 months ago
Hmm, I'm not totally sure about this one. I know network attacks can come from different vectors, but I'm not certain about the specific terminology used here. I'll have to think it through.
upvoted 0 times
...
Willard
5 months ago
Ah, I see. If you make changes directly to the delivery activity, they won't carry over to the next time the template is used. Smart to update the template instead.
upvoted 0 times
...
Lynda
5 months ago
Okay, let me see... Form button, List banner button, and Form choice all sound like valid UI action types. I'm not sure about List choice though, that one's got me stumped.
upvoted 0 times
...
Julio
5 months ago
Ah, this is a good one. I'd say Sqoop is probably the way to go here. It's built for this kind of RDBMS-to-Hadoop data transfer, and it should handle the job efficiently. Plus, I've used it before, so I'm familiar with the process.
upvoted 0 times
...
Leoma
5 months ago
I'm a bit unsure about this one. I know Postfix and Sendmail, but the other options are less familiar to me.
upvoted 0 times
...
Zona
2 years ago
Yeah, ingress means entering and egress means leaving. So A makes sense.
upvoted 0 times
...
Brock
2 years ago
True, but 'attack vectors' usually refer to how threats enter and exit a network.
upvoted 0 times
...
Gilbert
2 years ago
Why not D) Malware and phishing? They are common attacks.
upvoted 0 times
...
Mari
2 years ago
I think the answer is A) Ingress and egress.
upvoted 0 times
...
Heike
2 years ago
Yes, about attack vectors, right?
upvoted 0 times
...
Zona
2 years ago
Did you see the question on network communications?
upvoted 0 times
...

Save Cancel