Cybersecurity-Audit-Certificate Exam Question 41

in key protection/management, access should be aligned with which of the following?
  • Cybersecurity-Audit-Certificate Exam Question 42

    Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
  • Cybersecurity-Audit-Certificate Exam Question 43

    The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:
  • Cybersecurity-Audit-Certificate Exam Question 44

    Which of the following is a feature of an intrusion detection system (IDS)?
  • Cybersecurity-Audit-Certificate Exam Question 45

    While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?