While limiting the creation of virtual machine images and snapshots (option D) may also help mitigate risks associated with data stored on virtual machines, it may not be as effective as restricting access to existing images and snapshots, particularly if unauthorized individuals already have access to these resources.
Therefore, restricting access to images and snapshots of virtual machines is likely the MOST effective control for protecting the confidentiality and integrity of data stored unencrypted on virtual machines.
A, Virtual Machines are used in staging or testing environment, Therefore, you cannot restrict access to the Data, hence monitoring is the correct answer
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MunaM
Highly Voted 2 years, 2 months agoSwallows
Most Recent 5 months ago3008
11 months, 2 weeks agoRabotai
1 year agocidigi
1 year, 3 months agom4s7er
1 year, 9 months ago