traditional sampling?

Which of the following features of continuous auditing provides the BEST level of assurance over traditional sampling?A . Reports can be generated more frequently for management.B . Automated tools provide more reliability than an auditors personal judgmentC . Voluminous dale can be analyzed at a high speed to show relevant...

August 21, 2024 No Comments READ MORE +

In public key cryptography, digital signatures are primarily used to;

In public key cryptography, digital signatures are primarily used to;A . ensure message integrity.B . ensure message accuracy.C . prove sender authenticity.D . maintain confidentiality.View AnswerAnswer: C

August 21, 2024 No Comments READ MORE +

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?

Which of the following are politically motivated hackers who target specific individuals or organizations to achieve various ideological ends?A . Malware researchersB . HacktivistsC . CybercriminalsD . Script kiddiesView AnswerAnswer: B

August 20, 2024 No Comments READ MORE +

The second line of defense in cybersecurity includes:

The second line of defense in cybersecurity includes:A . conducting organization-wide control self-assessments.B . risk management monitoring, and measurement of controls.C . separate reporting to the audit committee within the organization.D . performing attack and breach penetration testing.View AnswerAnswer: B

August 19, 2024 No Comments READ MORE +

Which of the following is the SLOWEST method of restoring data from backup media?

Which of the following is the SLOWEST method of restoring data from backup media?A . Monthly backupB . Full backupC . Differential BackupD . Incremental backupView AnswerAnswer: D

August 19, 2024 No Comments READ MORE +

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?A . AttackB . PayloadC . VulnerabilityD . TargetView AnswerAnswer: A

August 18, 2024 No Comments READ MORE +

Which type of tools look for anomalies in user behavior?

Which type of tools look for anomalies in user behavior?A . Rootkit detection toolsB . Trend/variance-detection toolsC . Audit reduction toolsD . Attack-signature-detection toolsView AnswerAnswer: B

August 18, 2024 No Comments READ MORE +

Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?

Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?A . Cross-site scripting vulnerabilityB . SQL injection vulnerabilityC . Memory leakage vulnerabilityD . Zero-day vulnerabilityView AnswerAnswer: D

August 16, 2024 No Comments READ MORE +

When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?

When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?A . Privileged usersB . Database administratorsC . Terminated employeesD . ContractorsView AnswerAnswer: A

August 16, 2024 No Comments READ MORE +

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?

Which of the following describes specific, mandatory controls or rules to support and comply with a policy?A . FrameworksB . GuidelinesC . BasedineD . StandardsView AnswerAnswer: D

August 15, 2024 No Comments READ MORE +