Which of the following is used to evaluate biometric access controls?
Which of the following is used to evaluate biometric access controls?
Which of the following statements best describes the level of detail Lisa should include with the risk respons
Lisa is the project manager of the SQL project for her company. She has completed the risk
response planning with her project team and is now ready to update the risk register to reflect the
risk response. Which of the following statements best describes the level of detail Lisa should
include with the risk responses she has created?
Which of the following types of IT organizational structures states that all IT resources are centralized̷
Which of the following types of IT organizational structures states that all IT resources are
centralized under a single reporting structure with centralized resource allocation (staffing), and
the organizational structure is built around the resource pools?
Which of the following situations would MOST inhibit the effective implementation of security governance:
Which of the following situations would MOST inhibit the effective implementation of security
governance:
Which of the following risks refer to probability that an actual return on an investment will be lower than th
Which of the following risks refer to probability that an actual return on an investment will be lower
than the investor’s expectations?
Who is ultimately responsible and accountable for reviewing user access to systems?
Who is ultimately responsible and accountable for reviewing user access to systems?
How many communication channels exist in this project?
You are the project manager for the ABC organization. Your current project has 75 internal
stakeholders and 245 external stakeholders. Many of the risks within your project will only affect
the internal stakeholders, but several of the identified risk events will affect the external
stakeholders. Management would like to know the total number of communication channels in the
project. How many communication channels exist in this project?
Which of the following domains of CGEIT aims to guarantee that the IT enables and supports the achievement of
Which of the following domains of CGEIT aims to guarantee that the IT enables and supports the
achievement of business objectives through the integration of IT strategic plans with business
strategic plans and the alignment of IT services with enterprise operations?
To achieve effective strategic alignment of security initiatives, it is important that:
To achieve effective strategic alignment of security initiatives, it is important that:
What are the PRIMARY requirements for developing risk scenarios?
What are the PRIMARY requirements for developing risk scenarios?
Each correct answer represents a part of the solution. Choose two.