Question 31

Which of the following is the BEST response when a potential IT control deficiency has been identified?
  • Question 32

    Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
  • Question 33

    Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
  • Question 34

    Which of the following approaches to bring you own device (BYOD) service delivery provides the BEST protection from data loss?
  • Question 35

    An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?