Which compensating control is the MOST effective to prevent fraud within an organization?
An organization is considering options to outsource their Information Technology (IT) operations. Although they do not sell anything on the Internet, they have a strong requirement in uptime of their application. After the offerings received by the Cloud Service Provider (CSP), the IT manager decided it was mandatory to develop processes to continue operations without access to community or public cloud-based applications. Which of the following arguments MOST likely led the IT manager to make this decision?
What is the HIGHEST security concern on trans-border data?
An organization wants to ensure the security of communications across its environment. What is the BEST way to provide confidentiality of data from handheld wireless devices to the internal network?
What is a malicious activity that overwhelms a Wireless Access Point (WAP)?
Which of the following security features is utilized to validate both user credentials and the health of the client device on a network?
What resources does a respondent have when contesting disciplinary action taken by the ISC2 Board of Directors?
One of the findings in the recent security assessment of a web application reads: "It appears that security is an afterthought in the web application development process. It is recommended that security be addressed earlier in the development process." Which of these choices would BEST remediate this security finding?
What is the PRIMARY benefit an organization obtains by adapting a cybersecurity framework to their cybersecurity program?
What order BEST reflects the steps when adding threat modeling practices to a Software Development Life Cycle (SDLC)?
Which of the following provides for continuous improvement of the change control process?
A large organization that processes protected data issues preconfigured laptops to workers who then access systems and data based on their role. As their technology ages, these laptops are replaced with newer devices. What is the BEST solution to mitigate risk associated with these devices?
When implementing a data classification program, Which is MOST important for measuring businesss impact?
A security analyst has been asked to build a data retention policy for a hospital. What is the FIRST action that needs to be performed in building this policy?
What is the PRIMARY secure protocol used by a Content Delivery Network (CDN)?