Question 196

After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?
  • Question 197

    One of the control specifications in the Cloud Controls Matrix (CCM) states that "independent reviews and assessments shall be performed at least annually to ensure that the organization addresses nonconformities of established policies, standards, procedures, and compliance obligation." Which of the following controls under the Audit Assurance and Compliance domain does this match to?
  • Question 198

    Which of the following is the MOST important audit scope document when conducting a review of a cloud service provider?
  • Question 199

    Under GDPR, an organization should report a data breach within what time frame?
  • Question 200

    Market share and geolocation are aspects PRIMARILY related to: