Question 16
What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
Question 17
Which of the following is MOST effective against external threats to an organization's confidential information?
Question 18
The compensating control that MOST effectively addresses the risk associated with piggybacking into a restricted area without a dead-man door is:
Question 19
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
Question 20
Which of the following is MOST critical to the design of relevant risk scenarios?