Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 5
List of questions
Question 41
Using digital evidence to provide validation that an attack has actually occurred is an example of;
Question 42
What is the FIRST activity associated with a successful cyber attack?
Question 43
Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?
Question 44
When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
Question 45
What is the MAIN consideration when storing backup files?
Question 46
Which of the following is the SLOWEST method of restoring data from backup media?
Question 47
Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Question 48
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
Question 49
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
Question 50
In public key cryptography, digital signatures are primarily used to;
Question