which type of defense against systems compromise?
Logging is an example of which type of defense against systems compromise?
what risk response?
Your project is an agricultural-based project that deals with plant irrigation systems. You have
discovered a byproduct in your project that your organization could use to make a profit. If your
organization seizes this opportunity it would be an example of what risk response?
Which of the following are effective controls for detecting duplicate transactions such as payment
Which of the following are effective controls for detecting duplicate transactions such as
payments made or received?
What answer best resolves the difficulty of risk management practices and the effort required?
Elizabeth is a project manager for her organization and she finds risk management to be very
difficult for her to manage. She asks you, a lead project manager, at what stage in the project will
risk management become easier. What answer best resolves the difficulty of risk management
practices and the effort required?
Which of the following is MOST important in developing a security strategy?
Which of the following is MOST important in developing a security strategy?
Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual l
Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO),
and Annual loss expectancy (ALE)?
Which of the following is a good control for protecting confidential data residing on a PC?
Which of the following is a good control for protecting confidential data residing on a PC?
Which stakeholder does Robert need to identify?
Robert is the business analyst for his organization and he’s working with several stakeholders to
identify the business need for an opportunity. Robert needs to identify the stakeholder that will be
responsible for authorizing the actions needed in order to meet the identified business need.
Which stakeholder does Robert need to identify?
What technique will you use with this simulation?
CORRECT TEXT
You are the project manager of the AMD project for your organization. In this project, you are
currently performing quantitative risk analysis. The tool and technique you are using is simulation
where the project model is computed many times with the input values chosen at random for each
iteration. The goal is to create a probability distribution from the iterations for the project schedule.
What technique will you use with this simulation?
Which of the following stages of the Forrester’s IT Governance Maturity Model describes that the IT gove
Which of the following stages of the Forrester’s IT Governance Maturity Model describes that the
IT governance processes are applied across the enterprise where all business units/entities
conform to the same set of IT governance processes, and IT investment decisions are based on
the enterprise view?