Isaca Cybersecurity Audit Practice Test - Questions Answers, Page 5

List of questions
Question 41

Using digital evidence to provide validation that an attack has actually occurred is an example of;
Question 42

What is the FIRST activity associated with a successful cyber attack?
Question 43

Which of the following BEST facilitates the development of metrics for repotting to senior management on vulnerability management efforts?
Question 44

When reviewing user management roles, which of the following groups presents the GREATEST risk based on their permissions?
Question 45

What is the MAIN consideration when storing backup files?
Question 46

Which of the following is the SLOWEST method of restoring data from backup media?
Question 47

Which of the following is MOST important to ensure the successful implementation of continuous auditing?
Question 48

Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
Question 49

While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?
Question 50

In public key cryptography, digital signatures are primarily used to;
Question