Which of the following controls BEST prevents users from intentionally or unintentionally accessing data they are not authorized to view?
An IS auditor has learned that a cloud service provider has not adequately secured its application programming interface (API). Which of the following is MOST important for the auditor to consider in an assessment of the potential risk factors?
Which of the following is EASIEST for a malicious attacker to detect?
Which of the following is used to help identify the most appropriate controls to meet an organization's specific security requirements?
Which control mechanism is used to detect the unauthorized modification of key configuration settings?
Which of the following is the PRIMARY goal of implementing a change management process?
Which of the following is the MOST cost-effective technique for implementing network security for human resources (HR) desktops and internal laptop users in an organization?
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Which of the following is an important reason for tracing the access and origin of an intrusion once it has been detected?
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?