Tentamen (uitwerkingen)
ISACA Studying Cyber Security Fundamentals | 150 Questions with 100% Correct Answers | Updated & Verified | 24 Pages
Three common controls used to protect availablity. a) redundancy, backups and access control b. Encryption, file permissions and access controls. c. Access controls, logging and digital signatures. d. Hashes, logging and backups. - ANS - A. Redundancy, backups and access control Governance has...
[Meer zien]