Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 7
List of questions
Question 61
Which of the following BEST characterizes security mechanisms for mobile devices?
Question 62
Which of the following is the GREATEST drawback when using the AICPA/CICA Trust Sen/ices to evaluate a cloud service provider?
Question 63
Which of the following cloud characteristics refers to resource utilization that can be optimized by leveraging charge-per-use capabilities?
Question 64
Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?
Question 65
The risk of an evil twin attack on mobile devices is PRIMARILY due to:
Question 66
Which of the following is a feature of a stateful inspection firewall?
Question 67
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
Question 68
Which of the following is the GREATEST risk pertaining to sensitive data leakage when users set mobile devices to 'always on' mode?
Question 69
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Question 70
Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Question