Question 861

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?
  • Question 862

    Judy has identified a risk event in her project that will have a high probability and a high impact. Based on the requirements of the project, Judy has asked to change the project scope to remove the associated requirement and the associated risk. What type of risk response is this?
  • Question 863

    Which of the following BEST confirms the existence and operating effectiveness of information systems controls?
  • Question 864

    NIST SP 800-53 identifies controls in three primary classes. What are they?
  • Question 865

    Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?