Question 31
When choosing a risk mitigation method what is the MOST important factor?
Question 32
Who in the organization determines access to information?
Question 33
When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
Question 34
Which of the following is a major benefit of applying risk levels?
Question 35
Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations. You have decided to deal with risk to information from people first.
How can you minimize risk to your most sensitive information before granting access?
How can you minimize risk to your most sensitive information before granting access?
