Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
A security setting to lock a profile after a certain number of unsuccessful login attempts would be MOST effective against which type of attack?
Which control mechanism is used to detect the unauthorized modification of key configuration settings?
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
Which of the following is the PRIMARY goal of implementing a change management process?
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which process converts extracted information to a format understood by investigators?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
When performing a teaming exercise, which team works to integrate the defensive tactics and controls from the defending team with the threats and vulnerabilities found by the attacking team?
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Which of the following provides an early signal of increasing risk exposures for an organization?
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
At which layer in the open systems interconnection (OSI) model does SSH operate?
Which of the following is the MOST serious consequence of mobile device loss or theft?
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
Which of the following is the SLOWEST method of restoring data from backup media?
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?
An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:
Which of the following is the BEST indication that an organization’s vulnerability management process is operating effectively?