Which of the following is a feature of an intrusion detection system (IDS)?
In the context of network communications, what are the two types of attack vectors?
Which of the following includes step-by-step directions for accomplishing a specific task?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
Which of the following is a limitation of intrusion detection systems (IDS)?
Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?
Which of the following is an objective of public key infrastructure (PKI)?
When passwords are tied into key generation, the strength of the encryption algorithm is:
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?
Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
in key protection/management, access should be aligned with which of the following?
Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?
Which of the following is the MOST important consideration when choosing between different types of cloud services?
In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Which of the following defines the minimum acceptable rules for policy compliance?
Which of the following describes computing capabilities that are available over the network and can be accessed by diverse client platforms?
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Which of the following is the PRIMARY goal of implementing a change management process?
The discovery of known dangerous artifacts on a network such as IP addresses or domain names helps to identify which of the following?
Security awareness training is MOST effective against which type of threat?
Which of the following would allow an IS auditor to obtain a bit-for-bit copy of data?
Which of the following describes a system that enforces a boundary between two or more networks, typically forming a barrier between a secure and an open environment such as the Internet?
Which of the following provides an early signal of increasing risk exposures for an organization?
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
Which of the following is MOST likely to result in unidentified cybersecurity risks?
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?
Which of the following backup methods takes the MOST time for restoration of data?
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?