Question 66

An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
  • Question 67

    Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
  • Question 68

    Which of the following BEST measures the operational effectiveness of risk management capabilities?
  • Question 69

    The BEST metric to demonstrate that servers are configured securely is the total number of servers:
  • Question 70

    A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to: