Question 416
A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
Question 417
Which of the following is the BEST evidence that a user account has been properly authorized?
Question 418
Which of the following is the BEST approach for determining whether a risk action plan is effective?
Question 419
Which of the following is the MOST important document regarding the treatment of sensitive data?
Question 420
Which of the following approaches BEST identifies information systems control deficiencies?