in key protection/management, access should be aligned with which of the following?
Which of the following controls BEST ensures a user creates a complex password?
During which incident response phase is the incident management team activated?
In the context of network communications, what are the two types of attack vectors?
Which of the following includes step-by-step directions for accomplishing a specific task?
Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?
Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?
Within the NIST core cybersecurity framework, which function is associated with using organizational understanding to minimize risk to systems, assets, and data?
Which of the following is the MOST important consideration when choosing between different types of cloud services?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
The protection of information from unauthorized access or disclosure is known as:
Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Which of the following is MOST likely to result in unidentified cybersecurity risks?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?
Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?
An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:
Which of the following is a team created PRIMARILY to improve the security posture of an organization?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?