<< Prev Question Next Question >>

Question 20/27

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (27q)
Question 1: A cloud customer configured and developed a solution on top ...
Question 2: An organization has an ISMS implemented, following ISO 27001...
Question 3: Which of the following approaches encompasses social enginee...
Question 4: Which of the following would be considered as a factor to tr...
Question 5: To assist an organization with planning a cloud migration st...
Question 6: The PRIMARY objective of an audit initiation meeting with a ...
Question 7: In all three cloud deployment models, (IaaS, PaaS, and SaaS)...
Question 8: To qualify for CSA STAR attestation for a particular cloud s...
Question 9: The rapid and dynamic rate of changes found in a cloud envir...
Question 10: Which of the following aspects of risk management involves i...
Question 11: A CSP providing cloud services currently being used by the U...
Question 12: When developing a cloud compliance program, what is the PRIM...
Question 13: Which of the following quantitative measures is KEY for an a...
Question 14: How should controls be designed by an organization?...
Question 15: What areas should be reviewed when auditing a public cloud?...
Question 16: Supply chain agreements between CSP and cloud customers shou...
Question 17: From the perspective of a senior cloud security audit practi...
Question 18: Which of the following CSP activities requires a client's ap...
Question 19: Changes to which of the following will MOST likely influence...
Question 20: After finding a vulnerability in an internet-facing server o...
Question 21: Which of the following is MOST important to consider when de...
Question 22: Which of the following is the risk associated with storing d...
Question 23: Which of the following is the BEST tool to perform cloud sec...
Question 24: During an audit it was identified that a critical applicatio...
Question 25: Which of the following should be the FIRST step to establish...
Question 26: Which of the following is an example of integrity technical ...
Question 27: Within an organization, which of the following functions sho...