Which of the following activities best describes a salience model?
Ben works as a project manager for the MJH Project. In this project, Ben is preparing to identify
stakeholders so he can communicate project requirements, status, and risks. Ben has elected to
use a salience model as part of his stakeholder identification process. Which of the following
activities best describes a salience model?
Batch control reconciliation is a _____________________ (fill in the blank) control for mitigating risk of ina
Batch control reconciliation is a _____________________ (fill in the blank) control for mitigating
risk of inadequate segregation of duties.
Which risk management process can satisfy management’s objective for your project?
You work as a project manager for BlueWell Inc. You are working on a project and the
management wants a rapid and cost-effective means for establishing priorities for planning risk
responses in your project. Which risk management process can satisfy management’s objective
for your project?
what is the immediate benefit of clearlydefined roles and responsibilities?
From an information security manager perspective, what is the immediate benefit of clearlydefined roles and responsibilities?
Which of the following is the first MOST step in the risk assessment process?
Which of the following is the first MOST step in the risk assessment process?
Key verification is one of the best controls for ensuring that:
Key verification is one of the best controls for ensuring that:
What title, in regard to risk, is bestowed on Thomas?
You are the project manager for your organization and you are working with Thomas, a project
team member. You and Thomas have been working on a specific risk response for a probable risk
event in the project. Thomas is empowered with a risk response and will control all aspects of the
identified risk response in which a particular risk event will happen within the project. What title, in
regard to risk, is bestowed on Thomas?
Which of the following should an information security manager use to BEST convey a sense of urgency to managem
An internal audit has identified major weaknesses over IT processing. Which of the following
should an information security manager use to BEST convey a sense of urgency to management?
Which of the following matrices is used to specify risk thresholds?
Which of the following matrices is used to specify risk thresholds?
how likely is it that a company’s implementation of IT will be successful?
If senior management is not committed to strategic planning, how likely is it that a company’s
implementation of IT will be successful?