Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?
Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?A . Backups of information are regularly tested.B . Data backups are available onsite for recovery.C . The recovery plan is executed during or after an...
Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?
Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?A . Capability maturity model integrationB . Balanced scorecardC . 60 270042009D . COBIT 5View AnswerAnswer: A
Which of the following is the MOST important step to determine the risks posed to an organization by social media?
Which of the following is the MOST important step to determine the risks posed to an organization by social media?A . Review costs related to the organization's social media outages.B . Review cybersecurity insurance requirements for the organization s social media.C . Review the disaster recovery strategy for the organization's...
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?
Which of the following presents the GREATEST challenge to information risk management when outsourcing IT function to a third party?A . It is difficult to know the applicable regulatory requirements when data is located on another country.B . Providers may be reluctant to share technical delays on the extent of...
The "recover" function of the NISI cybersecurity framework is concerned with:
The "recover" function of the NISI cybersecurity framework is concerned with:A . planning for resilience and timely repair of compromised capacities and service.B . identifying critical data to be recovered m case of a security incident.C . taking appropriate action to contain and eradicate a security incident.D . allocating costs...
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?A . Evaluation of implementation detailsB . Hands-on testingC . Risk-based shakeoutD . Inventory and discoveryView AnswerAnswer: D
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?A . Evaluation of implementation detailsB . Hands-on testingC . Hand-based shakeoutD . Inventory and discoveryView AnswerAnswer: D
Which of the following backup procedure would only copy files that have changed since the last backup was made?
Which of the following backup procedure would only copy files that have changed since the last backup was made?A . Incremental backupB . Daily backupC . Differential backupD . Full backupView AnswerAnswer: A
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:
he MOST significant limitation of vulnerability scanning is the fact that modern scanners only detect:A . common vulnerabilities.B . unknown vulnerabilities.C . known vulnerabilities.D . zero-day vulnerabilities.View AnswerAnswer: C
What is the FIRST activity associated with a successful cyber attack?
What is the FIRST activity associated with a successful cyber attack?A . ExploitationB . ReconnaissanceC . Maintaining a presenceD . Creating attack toolsView AnswerAnswer: B