Which of the following is the MOST important to keep in mind when assessing the value of information?
Which of the following is the MOST important to keep in mind when assessing the value of
information?
What type of risk response is this?
Wendy has identified a risk event in her project that has an impact of $75,000 and a 60 percent
chance of happening. Through research, her project team learns that the risk impact can actually
be reduced to just $15,000 with only a ten percent chance of occurring. The proposed solution will
cost $25,000. Wendy agrees to the $25,000 solution. What type of risk response is this?
What is the key distinction between encryption and hashing algorithms?
What is the key distinction between encryption and hashing algorithms?
Which of the following is the best course of action that Beth can take in regard to communicating with the emp
Beth is an HR Professional for her organization and she’s been alerted by management that the
company will be outsourcing a large portion of operations. This outsourcing will likely cause
several employees to lose employment with the organization. Which of the following is the best
course of action that Beth can take in regard to communicating with the employees about the
outsourcing change?
What would a security manager PRIMARILY utilize when proposing the implementation of a security solution?
What would a security manager PRIMARILY utilize when proposing the implementation of a
security solution?
Which of the following processes addresses the risks by their priorities, schedules the project management pla
Which of the following processes addresses the risks by their priorities, schedules the project
management plan as required, and inserts resources and activities into the budget?
Which of the following is BEST characterized by unauthorized modification of data before or during systems dat
Which of the following is BEST characterized by unauthorized modification of data before or during
systems data entry?
Which of the following processes are involved under the COBIT framework?
Which of the following processes are involved under the COBIT framework? Each correct answer
represents a complete solution. Choose all that apply.
which of the following would be of MOST use to the information security’ department?
To justify its ongoing security budget, which of the following would be of MOST use to the
information security’ department?
which of the following risk responses is used for negative risk events?
Out of several risk responses, which of the following risk responses is used for negative risk
events?