Cybersecurity-Audit-Certificate Exam Question 41
in key protection/management, access should be aligned with which of the following?
Cybersecurity-Audit-Certificate Exam Question 42
Which of the following is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability?
Cybersecurity-Audit-Certificate Exam Question 43
The GREATEST benefit of using the CSA Cloud Controls Matrix is that it provides:
Cybersecurity-Audit-Certificate Exam Question 44
Which of the following is a feature of an intrusion detection system (IDS)?
Cybersecurity-Audit-Certificate Exam Question 45
While risk is measured by potential activity, which of the following describes the actual occurrence of a threat?