Question 36

An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?
  • Question 37

    A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?
  • Question 38

    Which of the following is MOST important to understand when determining an appropriate risk assessment approach?
  • Question 39

    During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
  • Question 40

    Who is at the BEST authority to develop the priorities and identify what risks and impacts would occur if there were loss of the organization's private information?