Q: 1
Which of the following is MOST important to verify when reviewing the effectiveness of an
organization's identity management program?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which of the following provides the GREATEST assurance that data can be recovered and restored in
a timely manner in the event of data loss?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
What is the FIRST phase of the ISACA framework for auditors reviewing cryptographic environments?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which phase typically occurs before containment of an incident?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following is a MAIN benefit of using Security as a Service (SECaaS) providers?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
What is the PRIMARY benefit of ensuring timely and reliable access to information systems?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
During which incident response phase is the incident management team activated?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following backup procedures would only copy files that have changed since the last
backup was made?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following is the BEST method of maintaining the confidentiality of digital information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2