Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 8
List of questions
Related questions
Which of the following is the MOST important consideration when choosing between different types of cloud services?
A.
Emerging risk and infrastructure scalability
B.
Security features available on demand
C.
Overall risk and benefits
D.
Reputation of the cloud providers
Which of the following devices is at GREATEST risk from activity monitoring and data retrieval?
A.
Mobile devices
B.
Cloud storage devices
C.
Desktop workstation
D.
Printing devices
Which intrusion detection system component is responsible for collecting data in the form of network packets, log files, or system call traces?
A.
Packet filters
B.
Analyzers
C.
Administration modules
D.
Sensors
Strong data loss prevention (DLP) solutions help protect information in which of the following states?
A.
At rest, in transit and in use
B.
Operating system application and database levels
C.
Public restricted, and confidential
D.
Data sent, data received, and data deleted
A data loss prevention (DLP) program helps protect an organization from:
A.
crypto ransomware infection.
B.
unauthorized access to servers and applications.
C.
unauthorized data modification.
D.
exfiltration of sensitive data.
Question