Question 41
You are the project manager of GHT project. You have implemented an automated tool to analyze and report on access control logs based on severity. This tool generates excessively large amounts of results.
You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked "critical". What you should do in order to fulfill that?
You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked "critical". What you should do in order to fulfill that?
Question 42
What are the key control activities to be done to ensure business alignment?
Each correct answer represents a part of the solution. Choose two.
Each correct answer represents a part of the solution. Choose two.
Question 43
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Question 44
Which of the following vulnerability assessment software can check for weak passwords on the network?
Question 45
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?