Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 7

List of questions
Question 61

Which of the following BEST characterizes security mechanisms for mobile devices?
Question 62

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
Question 63

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?
Question 64

Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?
Question 65

The risk of an evil twin attack on mobile devices is PRIMARILY due to:
Question 66

Which of the following is a feature of a stateful inspection firewall?
Question 67

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
Question 68

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to 'always on' mode?
Question 69

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Question 70

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Question