Isaca ISACA Cybersecurity Audit Certificate Exam Cybersecurity-Audit-Certificate Question # 15 Topic 2 Discussion

Isaca ISACA Cybersecurity Audit Certificate Exam Cybersecurity-Audit-Certificate Question # 15 Topic 2 Discussion

Cybersecurity-Audit-Certificate Exam Topic 2 Question 15 Discussion:
Question #: 15
Topic #: 2

Which control mechanism is used to detect the unauthorized modification of key configuration settings?


A.

Sandboxing


B.

Whitelisting


C.

URL filtering


D.

File integrity


Get Premium Cybersecurity-Audit-Certificate Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.