Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?

Which of the following is a client-server program that opens a secure, encrypted command-line shell session from the Internet for remote logon?A . VPNB . IPsecC . SSHD . SFTPView AnswerAnswer: C Explanation: The correct answer is C. SSH. SSH stands for Secure Shell, a client-server program that opens a...

October 5, 2023 No Comments READ MORE +

One way to control the integrity of digital assets is through the use of:

One way to control the integrity of digital assets is through the use of:A . policies.B . frameworks.C . cachingD . hashing.View AnswerAnswer: D Explanation: One way to control the integrity of digital assets is through the use of hashing. This is because hashing is a technique that applies a...

October 4, 2023 No Comments READ MORE +

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?A . Capability maturity model integrationB . Balanced scorecardC . 60 270042009D . COBIT 5View AnswerAnswer: A Explanation: The document that contains the essential elements of effective processes and describes an...

October 4, 2023 No Comments READ MORE +

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?A . Evaluation of implementation detailsB . Hands-on testingC . Risk-based shakeoutD . Inventory and discoveryView AnswerAnswer: D Explanation: The FIRST phase of the ISACA framework for auditors reviewing cryptographic environments is inventory and discovery. This is...

October 4, 2023 No Comments READ MORE +

The "recover" function of the NISI cybersecurity framework is concerned with:

The "recover" function of the NISI cybersecurity framework is concerned with:A . planning for resilience and timely repair of compromised capacities and service.B . identifying critical data to be recovered m case of a security incident.C . taking appropriate action to contain and eradicate a security incident.D . allocating costs...

October 3, 2023 No Comments READ MORE +

Security awareness training is MOST effective against which type of threat?

Security awareness training is MOST effective against which type of threat?A . Command injectionB . Denial of serviceC . Social engineeringD . Social injectionView AnswerAnswer: C Explanation: Security awareness training is MOST effective against social engineering threats. This is because social engineering is a type of attack that exploits human...

October 3, 2023 No Comments READ MORE +

Which of the following is the BEST indication of mature third-party vendor risk management for an organization?

Which of the following is the BEST indication of mature third-party vendor risk management for an organization?A . The third party's security program Mows the organization s security program.B . The organization maintains vendor security assessment checklists.C . The third party maintains annual assessments of control effectiveness.D . The organization's...

October 3, 2023 No Comments READ MORE +

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:

The GREATEST advantage of using a common vulnerability scoring system is that it helps with:A . risk aggregation.B . risk prioritization.C . risk elimination.D . risk quantificationView AnswerAnswer: B Explanation: The GREATEST advantage of using a common vulnerability scoring system is that it helps with risk prioritization. This is because...

October 2, 2023 No Comments READ MORE +

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?

Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?A . It is difficult to know the applicable regulatory requirements when data is located on another country.B . Providers may be reluctant to share technical delays on the extent of...

October 1, 2023 No Comments READ MORE +

Which of the following is the MOST important step to determine the risks posed to an organization by social media?

Which of the following is the MOST important step to determine the risks posed to an organization by social media?A . Review costs related to the organization's social media outages.B . Review cybersecurity insurance requirements for the organization s social media.C . Review the disaster recovery strategy for the organization's...

September 30, 2023 No Comments READ MORE +