Which control mechanism is used to detect the unauthorized modification of key configuration settings?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?
Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
Which of the following is the MOST serious consequence of mobile device loss or theft?
The administrator for a human resources (HR) system has access to the system as a user as well as support. Which of the following is the BEST control to help prevent intentional or accidental misuse of the privilege?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
The most common use of asymmetric algorithms is to:
Which of the following is the GREATEST advantage of using a virtual private network (VPN) over dedicated circuits and dial-in servers?
Which of the following BEST characterizes security mechanisms for mobile devices?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |