- (Topic 2)
An information security department is required to remediate system vulnerabilities when they are discovered. Please select the three primary remediation methods that can be used on an affected system.
Correct Answer:C
- (Topic 3)
Which of the following is critical in creating a security program aligned with an organization’s goals?
Correct Answer:B
- (Topic 2)
An IT auditor has recently discovered that because of a shortage of skilled operations personnel, the security administrator has agreed to work one late night shift a week as the senior computer operator. The most appropriate course of action for the IT auditor is to:
Correct Answer::A
- (Topic 2)
Which represents PROPER separation of duties in the corporate environment?
Correct Answer:D
- (Topic 1)
Risk that remains after risk mitigation is known as
Correct Answer:B