Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?

Which component of an organization's cybersecurity risk assessment framework would allow management to implement user controls based on a user's role?A . Prompt response and remediation policyB . Inventory of information assetsC . Information access managementD . Standard security configurationsView AnswerAnswer: C

September 29, 2023 No Comments READ MORE +

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?

Which of the following best describes a cyberattacK in which an organization faces a denial-of-service threat created through malicious data encryption?A . Phishing.B . Ransomware.C . Hacking.D . MakvareView AnswerAnswer: D

September 29, 2023 No Comments READ MORE +

Which of the following best describes the primary objective of cybersecurity?

Which of the following best describes the primary objective of cybersecurity?A . To protect the effective performance of IT general and application controls.B . To regulate users ‘behavior it the web and cloud environment.C . To prevent unauthorized access to information assets.D . To secure application of protocols and authorization...

September 28, 2023 No Comments READ MORE +

For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?

For which of the following scenarios would the most recent backup of the human resources database be the best source of information to use?A . An incorrect program fix was implemented just prior to the database backup.B . The organization is preparing to train all employees on the new self-service...

September 28, 2023 No Comments READ MORE +

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?

Which of the following is a result of Implementing on e-commerce system, which relies heavily on electronic data interchange and electronic funds transfer, for purchasing and biting?A . Higher cash flow and treasury balances.B . Higher inventory balancesC . Higher accounts receivable.D . Higher accounts payableView AnswerAnswer: D

September 28, 2023 No Comments READ MORE +

The management of working capital is most crucial for which of the following aspects of business?

The management of working capital is most crucial for which of the following aspects of business?A . LiquidityB . ProfitabilityC . SolvencyD . EfficiencyView AnswerAnswer: A

September 28, 2023 No Comments READ MORE +

Which type of bond did the organization issue?

An organization with a stable rating, as assessed by International rating agencies, has issued a bond not backed by assets or collateral. Payments of the interests and the principal to bondholders are guaranteed by the organization. Which type of bond did the organization issue?A . A sinking fund bond.B ....

September 28, 2023 No Comments READ MORE +

Which of the following is a characteristic of big data?

Which of the following is a characteristic of big data?A . Big data is being generated slowly due to volume.B . Big data must be relevant for the purposes of organizations.C . Big data comes from a single type of formal.D . Big data is always changingView AnswerAnswer: D

September 28, 2023 No Comments READ MORE +

Which of the following is an example of a physical control?

Which of the following is an example of a physical control?A . Providing fire detection and suppression equipmentB . Establishing a physical security policy and promoting it throughout the organizationC . Performing business continuity and disaster recovery planningD . Keeping an offsite backup of the organization's critical dataView AnswerAnswer: A

September 28, 2023 No Comments READ MORE +

What type of attack was perpetrated?

An intruder posing as the organization's CEO sent an email and tricked payroll staff into providing employees' private tax information. What type of attack was perpetrated?A . Boundary attack.B . Spear phishing attack.C . Brute force attack.D . Spoofing attack.View AnswerAnswer: B

September 28, 2023 No Comments READ MORE +