Question 41

You are the project manager of GHT project. You have implemented an automated tool to analyze and report on access control logs based on severity. This tool generates excessively large amounts of results.
You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked "critical". What you should do in order to fulfill that?
  • Question 42

    What are the key control activities to be done to ensure business alignment?
    Each correct answer represents a part of the solution. Choose two.
  • Question 43

    Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
  • Question 44

    Which of the following vulnerability assessment software can check for weak passwords on the network?
  • Question 45

    An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?