The "recover" function of the NISI cybersecurity framework is concerned with:

The "recover" function of the NISI cybersecurity framework is concerned with:A . planning for resilience and timely repair of compromised capacities and service.B . identifying critical data to be recovered m case of a security incident.C . taking appropriate action to contain and eradicate a security incident.D . allocating costs...

November 12, 2023 No Comments READ MORE +

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?

Which of the following provides the GREATEST assurance that data can be recovered and restored in a timely manner in the event of data loss?A . Backups of information are regularly tested.B . Data backups are available onsite for recovery.C . The recovery plan is executed during or after an...

November 11, 2023 No Comments READ MORE +

The protection of information from unauthorized access or disclosure is known as:

The protection of information from unauthorized access or disclosure is known as:A . access control.B . cryptographC . media protect on.D . confidentiality.View AnswerAnswer: D Explanation: The protection of information from unauthorized access or disclosure is known as confidentiality. This is because confidentiality is one of the three main objectives...

November 11, 2023 No Comments READ MORE +

One way to control the integrity of digital assets is through the use of:

One way to control the integrity of digital assets is through the use of:A . policies.B . frameworks.C . cachingD . hashing.View AnswerAnswer: D Explanation: One way to control the integrity of digital assets is through the use of hashing. This is because hashing is a technique that applies a...

November 10, 2023 No Comments READ MORE +

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?

Which of the following contains the essential elements of effective processes and describes an improvement path considering quality and effectiveness?A . Capability maturity model integrationB . Balanced scorecardC . 60 270042009D . COBIT 5View AnswerAnswer: A Explanation: The document that contains the essential elements of effective processes and describes an...

November 10, 2023 No Comments READ MORE +

Which of the following is the BEST method of maintaining the confidentiality of digital information?

Which of the following is the BEST method of maintaining the confidentiality of digital information?A . Use of access controls, file permissions, and encryptionB . Use of backups and business continuity planningC . Use of logging digital signatures, and write protectionD . Use of the awareness tracing programs and related...

October 15, 2023 No Comments READ MORE +

Which of the following backup procedure would only copy files that have changed since the last backup was made?

Which of the following backup procedure would only copy files that have changed since the last backup was made?A . Incremental backupB . Daily backupC . Differential backupD . Full backupView AnswerAnswer: A Explanation: The backup procedure that would only copy files that have changed since the last backup was...

October 14, 2023 No Comments READ MORE +

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?

What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?A . Evaluation of implementation detailsB . Hands-on testingC . Risk-based shakeoutD . Inventory and discoveryView AnswerAnswer: D Explanation: The FIRST phase of the ISACA framework for auditors reviewing cryptographic environments is inventory and discovery. This is...

October 14, 2023 No Comments READ MORE +

The protection of information from unauthorized access or disclosure is known as:

The protection of information from unauthorized access or disclosure is known as:A . access control.B . cryptographC . media protect on.D . confidentiality.View AnswerAnswer: D Explanation: The protection of information from unauthorized access or disclosure is known as confidentiality. This is because confidentiality is one of the three main objectives...

October 13, 2023 No Comments READ MORE +

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?

Which of the following is MOST critical to guiding and managing security activities throughout an organization to ensure objectives are met?A . Allocating a significant amount of budget to security investmentsB . Adopting industry security standards and frameworksC . Establishing metrics to measure and monitor security performanceD . Conducting annual...

October 13, 2023 No Comments READ MORE +