Question 416

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
  • Question 417

    Which of the following is the BEST evidence that a user account has been properly authorized?
  • Question 418

    Which of the following is the BEST approach for determining whether a risk action plan is effective?
  • Question 419

    Which of the following is the MOST important document regarding the treatment of sensitive data?
  • Question 420

    Which of the following approaches BEST identifies information systems control deficiencies?