Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Using digital evidence to provide validation that an attack has actually occurred is an example of;

A.

computer forensic

B.

extraction.

C.

identification.

D.

data acquisition.

Which of the following is the MAIN purpose of system hardening?

A.

To enforce the principle of least privilege

B.

To create a security-conscious environment

C.

To reduce vulnerability by limiting attack vectors

D.

To protect the system from all possible threats

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

A.

Resource contention

B.

Identity spoofing and phishing

C.

Confidentiality, integrity, and availability

D.

Denial of service

Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?

A.

Unauthorized access may jeopardize data confidentiality, integrity, or availability.

B.

Operations may be adversely affected if data cannot be recovered and restored timely.

C.

Unauthorized use of valid credentials may compromise encrypted data at rest.

D.

An ineffective firewall may fail to identify and block unwanted network traffic.

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?

A.

Replication of privileged access and the greater likelihood of physical loss increases risk levels.

B.

The risk associated with mobile devices is less than that of other devices and systems.

C.

The risk associated with mobile devices cannot be mitigated with similar controls for workstations.

D.

The ability to wipe mobile devices and disable connectivity adequately mitigates additional

In the context of network communications, what are the two types of attack vectors?

A.

Ingress and egress

B.

Physical theft and loss

C.

Insider and privilege misuse

D.

Malware and phishing

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?

A.

Private hosting

B.

Public hosting

C.

Shared hosting

D.

Hybrid hosting

Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?

A.

Password-based access control

B.

Digital signature

C.

Secret key encryption

D.

Cryptographic hash function

What is the PRIMARY benefit of ensuring timely and reliable access to information systems?

A.

Improved data integrity

B.

Consistent reporting functionality

C.

Enhanced identity and access management

D.

Increased data availability

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

A.

Evaluation of implementation details

B.

Hands-on testing

C.

Risk-based shakeout

D.

Inventory and discovery