An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Which of the following provides an early signal of increasing risk exposures for an organization?
When performing a teaming exercise, which team works to integrate the defensive tactics and controls from the defending team with the threats and vulnerabilities found by the attacking team?
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
Which of the following is MOST important to consider when defining actions to be taken in the event an intrusion is detected as part of an intrusion detection system (IDS) policy?
Which of the following is the BEST indication of mature third-party vendor risk management for an organization?
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:
Security awareness training is MOST effective against which type of threat?
In the context of network communications, what are the two types of attack vectors?
Which of the following is the SLOWEST method of restoring data from backup media?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?
Which of the following costs are typically covered by cybersecurity insurance?
Which of the following is a passive activity that could be used by an attacker during reconnaissance to gather information about an organization?
Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?
A healthcare organization recently acquired another firm that outsources its patient information processing to a third-party Software as a Service (SaaS) provider. From a regulatory perspective, which of the following is MOST important for the healthcare organization to determine?
Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?
Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?
Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?
Why are security frameworks an important part of a cybersecurity strategy?
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
What should be an IS auditor's GREATEST concern when an organization's virtual private network (VPN) is implemented on employees' personal mobile devices?
Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Which of the following is a limitation of intrusion detection systems (IDS)?
Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Which of the following is a known potential risk of using a software defined perimeter (SDP) controller?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?