Which of the following is a more efficient form of public key cryptography as it demands less computational power and offers more security per bit?
Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
Which of the following injects malicious scripts into a trusted website to infect a target?
Which of the following costs are typically covered by cybersecurity insurance?
Cyber threat intelligence aims to research and analyze trends and technical developments in which of the following areas?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
Which type of firewall blocks many types of attacks, such as cross-site scripting (XSS) and structured query language (SQL) injection?
Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?
When performing a teaming exercise, which team works to integrate the defensive tactics and controls from the defending team with the threats and vulnerabilities found by the attacking team?
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Which of the following defines the minimum acceptable rules for policy compliance?
Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?
Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
The "recover" function of the NISI cybersecurity framework is concerned with:
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
in key protection/management, access should be aligned with which of the following?
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
Which of the following is the MOST important consideration when choosing between different types of cloud services?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
Using digital evidence to provide validation that an attack has actually occurred is an example of;
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
Which of the following is a limitation of intrusion detection systems (IDS)?