Question 66
Which of the following should be the PRIMARY concern of an IS auditor during a review of an external IT service level agreement (SLA) for computer operations?
Question 67
When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?
Question 68
REST APIs are the standard for web-based services because they run over HTTPS and work well across diverse environments.
Question 69
After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?
Question 70
You have been assigned the implementation of an ISMS, whose scope must cover both on premise and cloud infrastructure. Which of the following is your BEST option?