Which process converts extracted information to a format understood by investigators?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?
The "recover" function of the NISI cybersecurity framework is concerned with:
The most common use of asymmetric algorithms is to:
Which of the following BEST characterizes security mechanisms for mobile devices?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
Which of the following is MOST likely to result in unidentified cybersecurity risks?
Which of the following is the MOST important consideration to help mitigate cybersecurity risks related to outsourcing a key business function?
Which of the following is the SLOWEST method of restoring data from backup media?
Which of the following is the MAIN reason why domain name system (DNS) data exfiltration is a significant threat to mobile computing?
Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
Which of the following includes step-by-step directions for accomplishing a specific task?
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
Which of the following defines the minimum acceptable rules for policy compliance?
When passwords are tied into key generation, the strength of the encryption algorithm is:
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Which of the following security mechanisms provides the BEST protection of data when a computer is stolen?
Which of the following types of backups requires the MOST time?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which of the following would provide the BEST basis for allocating proportional protection activities when comprehensive classification is not feasible?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Which of the following is the MOST relevant type of audit to conduct when fraud has been detected following an incident?
Which phase typically occurs before containment of an incident?
The "recover" function of the NIST cybersecurity framework is concerned with:
Which of the following describes Secure Hypertext Transfer Protocol (HTTPS)?
In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?
Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
Which of the following is MOST important to verify when reviewing the effectiveness of an organization's identity management program?
One way to control the integrity of digital assets is through the use of:
Which of the following backup procedures would only copy files that have changed since the last backup was made?
Security awareness training is MOST effective against which type of threat?
Which of the following is MOST effective in detecting unknown malware?
Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to "always on" mode?
What is the MAIN objective of an intrusion detection system (IDS) policy?
Which of the following BEST helps IT administrators to ensure servers have no unnecessary features installed?