Question 21

A SIEM device should be tuned in regularly to:
  • Question 22

    Which of the following uses security and encryption as means to prevent unauthorized copying and limitations on distribution to only those who pay?
  • Question 23

    When the data is transferred to third party. who is ultimately responsible for security of data?
  • Question 24

    A cloud storage architecture that caches content close to locations of high demand is known as:
  • Question 25

    Which of the following allows organizations to access, report, and obtain evidence of actions, controls, and processes that were performed or run by a specified user?