ExamGecko
Home / Isaca / Cybersecurity Audit / List of questions
Ask Question

Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 7

Add to Whishlist

List of questions

Question 61

Report Export Collapse

Which of the following BEST characterizes security mechanisms for mobile devices?

Become a Premium Member for full access
  Unlock Premium Member

Question 62

Report Export Collapse

Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?

Become a Premium Member for full access
  Unlock Premium Member

Question 63

Report Export Collapse

Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?

Become a Premium Member for full access
  Unlock Premium Member

Question 64

Report Export Collapse

Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?

Become a Premium Member for full access
  Unlock Premium Member

Question 65

Report Export Collapse

The risk of an evil twin attack on mobile devices is PRIMARILY due to:

Become a Premium Member for full access
  Unlock Premium Member

Question 66

Report Export Collapse

Which of the following is a feature of a stateful inspection firewall?

Become a Premium Member for full access
  Unlock Premium Member

Question 67

Report Export Collapse

Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:

Become a Premium Member for full access
  Unlock Premium Member

Question 68

Report Export Collapse

Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to 'always on' mode?

Become a Premium Member for full access
  Unlock Premium Member

Question 69

Report Export Collapse

An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?

Become a Premium Member for full access
  Unlock Premium Member

Question 70

Report Export Collapse

Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8