Who would be in the BEST position to determine the recovery point objective (RPO) for business applications?
Who would be in the BEST position to determine the recovery point objective (RPO) for business
applications?
Which two components PRIMARILY must be assessed in an effective risk analysis?
Which two components PRIMARILY must be assessed in an effective risk analysis?
Information security managers should use risk assessment techniques to:
Information security managers should use risk assessment techniques to:
In assessing risk, it is MOST essential to:
In assessing risk, it is MOST essential to:
When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporat
When the computer incident response team (CIRT) finds clear evidence that a hacker has
penetrated the corporate network and modified customer information, an information security
manager should FIRST notify:
which of the following areas?
Data owners are PRIMARILY responsible for establishing risk mitigation methods to address
which of the following areas?
The PRIMARY goal of a corporate risk management program is to ensure that an organization’s:
The PRIMARY goal of a corporate risk management program is to ensure that an organization’s:
It is important to classify and determine relative sensitivity of assets to ensure that:
It is important to classify and determine relative sensitivity of assets to ensure that:
In this situation an information security manager should:
The service level agreement (SLA) for an outsourced IT function does not reflect an adequate
level of protection. In this situation an information security manager should:
By doing so, the net effect will be to PRIMARILY reduce the:
An information security manager has been assigned to implement more restrictive preventive
controls. By doing so, the net effect will be to PRIMARILY reduce the: