Question 66

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
  • Question 67

    The acceptance of control costs that exceed risk exposure is MOST likely an example of:
  • Question 68

    Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
  • Question 69

    Which of the following role carriers is accounted for analyzing risks, maintaining risk profile, and risk-aware decisions?
  • Question 70

    You are the project manager of GHT project. Your hardware vendor left you a voicemail saying that the delivery of the equipment you have ordered would not arrive on time. She wanted to give you a heads-up and asked that you return the call. Which of the following statements is TRUE?