Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 6

List of questions
Question 51

Which of the following is an example of an application security control?
Question 52

Which control mechanism is used to detect the unauthorized modification of key configuration settings?
Question 53

Which of the following is an attack attribute of an advanced persistent threat (APT) that is designed to remove data from systems and networks?
Question 54

Which of the following is a limitation of intrusion detection systems (IDS)?
Question 55

What would be an IS auditor's BEST response to an IT managers statement that the risk associated with the use of mobile devices in an organizational setting is the same as for any other device?
Question 56

Which of the following is the MOST serious consequence of mobile device loss or theft?
Question 57

Which of the following is EASIEST for a malicious attacker to detect?
Question 58

In cloud computing, which type of hosting is MOST appropriate for a large organization that wants greater control over the environment?
Question 59

Which of the following should an IS auditor do FIRST to ensure cyber security-related legal and regulatory requirements are followed by an organization?
Question 60

Which of the following is a feature of an intrusion detection system (IDS)?
Question