nerdexam
IsacaIsaca

CCAK · Question #117

CCAK Question #117: Real Exam Question with Answer & Explanation

Sign in or unlock CCAK to reveal the answer and full explanation for question #117. The question stem and answer options stay visible for context.

Cloud Security Auditing

Question

After finding a vulnerability in an internet-facing server of an organization, a cybersecurity criminal is able to access an encrypted file system and successfully manages to overwrite part of some files with random data. In reference to the Top Threats Analysis methodology, how would you categorize the technical impact of this incident?

Options

  • AAs an integrity breach
  • BAs control breach
  • CAs an availability breach
  • DAs a confidentiality breach

Unlock CCAK to see the answer

You've previewed enough free CCAK questions. Unlock CCAK for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Security Incident Impact#Security Controls#Threat Analysis#Cloud Auditing
Full CCAK PracticeBrowse All CCAK Questions