Isaca Cybersecurity-Audit-Certificate - ISACA Cybersecurity Audit Certificate Exam
Total 134 questions
Which of the following backup methods takes the MOST time for restoration of data?
Which of the following BEST characterizes security mechanisms for mobile devices?
Using a data loss prevention (DLP) solution to monitor data saved to a USB memory device is an example of managing:
What is the MAIN consideration when storing backup files?
A cloud service provider is used to perform analytics on an organization's sensitive data. A data leakage incident occurs in the service providers network from a regulatory perspective, who is responsible for the data breach?
The integrity of digital assets can be controlled by:
Which of the following costs are typically covered by cybersecurity insurance?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:
When passwords are tied into key generation, the strength of the encryption algorithm is: