Question 236
What is the IMMEDIATE step after defining set of risk scenarios?
Question 237
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Question 238
An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?
Question 239
An enterprise has identified risk events in a project. While responding to these identified risk events, which among the following stakeholders is MOST important for reviewing risk response options to an IT risk.
Question 240
The BEST control to mitigate the risk associated with project scope creep is to: