traditional sampling?
Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?A . Reports can be generated more frequently for management.B . Automated tools provide more reliability than an auditors personal judgmentC . Voluminous dale can be analyzed at a high speed to show relevant...
In public key cryptography, digital signatures are primarily used to;
In public key cryptography, digital signatures are primarily used to;A . ensure message integrity.B . ensure message accuracy.C . prove sender authenticity.D . maintain confidentiality.View AnswerAnswer: C
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?
Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?A . Malware researchersB . HacktivistsC . CybercriminalsD . Script kiddiesView AnswerAnswer: B
The second line of defense in cybersecurity includes:
The second line of defense in cybersecurity includes:A . conducting organization-wide control self-assessments.B . risk management monitoring, and measurement of controls.C . separate reporting to the audit committee within the organization.D . performing attack and breach penetration testing.View AnswerAnswer: B
Which of the following is the SLOWEST method of restoring data from backup media?
Which of the following is the SLOWEST method of restoring data from backup media?A . Monthly backupB . Full backupC . Differential BackupD . Incremental backupView AnswerAnswer: D
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?A . AttackB . PayloadC . VulnerabilityD . TargetView AnswerAnswer: A
Which type of tools look for anomalies in user behavior?
Which type of tools look for anomalies in user behavior?A . Rootkit detection toolsB . Trend/variance-detection toolsC . Audit reduction toolsD . Attack-signature-detection toolsView AnswerAnswer: B
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?A . Cross-site scripting vulnerabilityB . SQL injection vulnerabilityC . Memory leakage vulnerabilityD . Zero-day vulnerabilityView AnswerAnswer: D
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?A . Privileged usersB . Database administratorsC . Terminated employeesD . ContractorsView AnswerAnswer: A
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?
Which of the following describes specific, mandatory controls or rules to support and comply with a policy?A . FrameworksB . GuidelinesC . BasedineD . StandardsView AnswerAnswer: D