00:00

QUESTION 36

- (Exam Topic 3)
Which of the following is MOST important when planning a network audit?

Correct Answer: D

QUESTION 37

- (Exam Topic 4)
A computer forensic audit is MOST relevant in which of the following situations?

Correct Answer: D

QUESTION 38

- (Exam Topic 3)
Which of the following should be the FRST step when developing a data toes prevention (DIP) solution for a large organization?

Correct Answer: D

QUESTION 39

- (Exam Topic 1)
Documentation of workaround processes to keep a business function operational during recovery of IT systems is a core part of a:

Correct Answer: C

QUESTION 40

- (Exam Topic 2)
Which of the following is a social engineering attack method?

Correct Answer: A