Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:
The protection of information from unauthorized access or disclosure is known as:
Which of the following is a weakness associated with the use of symmetric, private keys in wired equivalent privacy (WEP) encryption?
Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?
Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
During which incident response phase is the incident management team activated?
A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
Which of the following is the MOST serious consequence of mobile device loss or theft?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
Which of the following injects malicious scripts into a trusted website to infect a target?
Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?
Using digital evidence to provide validation that an attack has actually occurred is an example of;
Which of the following backup procedures would only copy files that have changed since the last backup was made?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?
Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?
What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?
Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
Which of the following includes step-by-step directions for accomplishing a specific task?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Strong data loss prevention (DLP) solutions help protect information in which of the following states?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?
Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?
In the context of network communications, what are the two types of attack vectors?
Which of the following is MOST important to ensure the successful implementation of continuous auditing?