Question 31

When choosing a risk mitigation method what is the MOST important factor?
  • Question 32

    Who in the organization determines access to information?
  • Question 33

    When considering using a vendor to help support your security devices remotely, what is the BEST choice for allowing access?
  • Question 34

    Which of the following is a major benefit of applying risk levels?
  • Question 35

    Scenario: Your program is developed around minimizing risk to information by focusing on people, technology, and operations. You have decided to deal with risk to information from people first.
    How can you minimize risk to your most sensitive information before granting access?