Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?
Which of the following mobile computing trends should cause the GREATEST concern for an organization that needs to protect sensitive organizational data?
An information security procedure indicates a requirement to sandbox emails. What does this requirement mean?
Which of the following cloud characteristics describes computing capabilities that can be provisioned without human interaction from the service provider?
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
What is the PRIMARY purpose of creating a security architecture?
Which of the following BIST enables continuous identification and mitigation of security threats to an organization?
An organization's responsibility to protect its assets and operations, including IT infrastructure and information, is referred to as:
During which incident response phase is evidence obtained and preserved?
Which of the following features of an anti-malware application is MOST helpful in protecting an organization from the potential of infected computers using a virtual private network (VPN)?
Which of the following is the MOST important step to determine the risks posed to an organization by social media?
Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
The integrity of digital assets can be controlled by:
Which of the following backup methods takes the MOST time for restoration of data?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
What is the MAIN objective of an intrusion detection system (IDS) policy?
Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?
A cybersecurity audit reveals that an organization's risk management function has the right to overrule business management decisions. Would the IS auditor find this arrangement acceptable?
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
Which of the following is the MAIN purpose of system hardening?
Which of the following defines the minimum acceptable rules for policy compliance?
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
Which of the following is MOST effective in detecting unknown malware?
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Which type of tools look for anomalies in user behavior?
in key protection/management, access should be aligned with which of the following?
Which of the following types of backups requires the MOST time?
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Which of the following backup procedures would only copy files that have changed since the last backup was made?
The most common use of asymmetric algorithms is to:
Which of the following provides additional protection other than encryption to messages transmitted using portable wireless devices?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
Which of the following presents the GREATEST risk to corporate data pertaining to mobile device usage?
Why are security frameworks an important part of a cybersecurity strategy?
A data loss prevention (DLP) program helps protect an organization from:
Which control mechanism is used to detect the unauthorized modification of key configuration settings?