New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Isaca Certificate of Cloud Auditing Knowledge CCAK Question # 34 Topic 4 Discussion

Isaca Certificate of Cloud Auditing Knowledge CCAK Question # 34 Topic 4 Discussion

CCAK Exam Topic 4 Question 34 Discussion:
Question #: 34
Topic #: 4

After finding a vulnerability in an Internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite parts of some files with random data. In reference to the Top Threats Analysis methodology, how would the technical impact of this incident be categorized?


A.

As an availability breach


B.

As a control breach


C.

As a confidentiality breach


D.

As an integrity breach


Get Premium CCAK Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.