Question 66
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Question 67
The acceptance of control costs that exceed risk exposure is MOST likely an example of:
Question 68
Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
Question 69
Which of the following role carriers is accounted for analyzing risks, maintaining risk profile, and risk-aware decisions?
Question 70
You are the project manager of GHT project. Your hardware vendor left you a voicemail saying that the delivery of the equipment you have ordered would not arrive on time. She wanted to give you a heads-up and asked that you return the call. Which of the following statements is TRUE?