Tsaaro academy

DATA PRIVACY

DATA PRIVACY

  • How can access be controlled on a logical level in an organization?
  • How can you prevent a CSRF attack as a cybersecurity analyst
  • What will you do as an auditor if you find that employees of an airlines are storing customer card details on word or notepad.
  • What is the right approach towards a Risk Assessment, tell me the chronology
  • Telnet should be disabled as it can be vulnerable, but if an organisation has to use it for business requirements then what can you do.
  • What protocols run at the Application Layer.
  • What are the steps in which you as a Digital Forensic expert you will practise at a crime scene where you have gone to investigate.
  • How do you identify the scope of an audit? What makes you conclude what can and what cannot be included in a ISO/PCI audit
  • What are the possible risks if you are going to audit a vendor who is about to set up a data centre. What are the things you will look out for.
  • If IRCTC is collecting your Card Data for making payments, should IRCTC be PCI DSS compliant.
  • What open source softwares can you use to recover deleted data?
  • As an auditor if a client is not using firewalls, so what other mechanisms should be there in place to safeguard them from cyber attacks
  • Is it mandatory for all organizations to be ISO certified?
  • How can you ensure that Segregation of Duties is being implemented in the organization.
lock

Fill The Form to Download The Report