Question 21
A SIEM device should be tuned in regularly to:
Question 22
Which of the following uses security and encryption as means to prevent unauthorized copying and limitations on distribution to only those who pay?
Question 23
When the data is transferred to third party. who is ultimately responsible for security of data?
Question 24
A cloud storage architecture that caches content close to locations of high demand is known as:
Question 25
Which of the following allows organizations to access, report, and obtain evidence of actions, controls, and processes that were performed or run by a specified user?