An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
Incomplete or inaccurate data may result in:
Which of the following is a potential risk associated with IT hardware or devices?
What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?
Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?
Which of the following is MOST likely to expose an organization to adverse threats?
Which of the following statements on an organization's cybersecurity profile is BEST suited for presentation to management?
To be effective, risk reporting and communication should provide:
A business impact analysis (BIA) generates the MOST benefit when:
Which of the following would be considered a cyber-risk?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |