Question 196
After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?
Question 197
One of the control specifications in the Cloud Controls Matrix (CCM) states that "independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligation." Which of the following controls under the Audit Assurance and Compliance domain does this match to?
Question 198
Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
Question 199
Under GDPR, an organization should report a data breach within what time frame?
Question 200
Market share and geolocation are aspects PRIMARILY related to: