ExamGecko
Question list
Search
Search

Question 12 - Cybersecurity Audit discussion

Report
Export

Availability can be protected through the use of:

A.
user awareness training and related end-user training.
Answers
A.
user awareness training and related end-user training.
B.
access controls. We permissions, and encryption.
Answers
B.
access controls. We permissions, and encryption.
C.
logging, digital signatures, and write protection.
Answers
C.
logging, digital signatures, and write protection.
D.
redundancy, backups, and business continuity management
Answers
D.
redundancy, backups, and business continuity management
Suggested answer: D

Explanation:

Availability can be protected through the use of redundancy, backups, and business continuity management. This is because these measures help to ensure that systems, data, and services are accessible and functional at all times, even in the event of a disruption or disaster. The other options are not directly related to protecting availability, but rather focus on enhancing confidentiality (A), integrity C, or awareness (D).

asked 18/09/2024
Mohamed Khazem
25 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first