An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?
The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?
During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?
Which of the following is the PRIMARY risk management responsibility of the third line of defense?
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?