Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?
Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Which of the following is a team created PRIMARILY to improve the security posture of an organization?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?
Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?
When passwords are tied into key generation, the strength of the encryption algorithm is:
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
Which of the following is MOST likely to result in unidentified cybersecurity risks?
Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?
Which of the following is the MOST important consideration when choosing between different types of cloud services?
At which layer in the open systems interconnection (OSI) model does SSH operate?
Which of the following backup procedure would only copy files that have changed since the last backup was made?
Which of the following is the SLOWEST method of restoring data from backup media?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?