Enjoy 15% Discount With Coupon 15off

Monthly Archives - December 2022

Which of the following best illustrates the primary focus of a risk-based approach to control self-assessment?

Which of the following best illustrates the primary focus of a risk-based approach to control self-assessment?A . To evaluate controls regarding the computer security of an oil refinery. B. To examine the processes involved in exploring, developing, and operating a gold mine. C. To assess the likelihood and impact of...

Read more...

Which of the following tools will be MOST effective during the investigation?

While reviewing some audit logs, an analyst has identified consistent modifications to the sshd_config file for an organization’s server. The analyst would like to investigate and compare contents of the current file with archived versions of files that are saved weekly. Which of the following tools will be MOST effective...

Read more...

Benchmarking a firm’s performance against industry competitors is most valuable because it can reveal:

Benchmarking a firm's performance against industry competitors is most valuable because it can reveal:A . a competitor's manufacturing processes. B. a firm's leadership ranking relative to industry peers. C. which processes require improvement. D. that no further improvement is possible.View AnswerAnswer: C

Read more...

Which of the following management objectives would be given HIGHER priority in an enterprise’s governance system when the enterprise is very risk-averse?

Which of the following management objectives would be given HIGHER priority in an enterprise's governance system when the enterprise is very risk-averse?A . Managed operations B. Managed security C. Managed portfolioView AnswerAnswer: C

Read more...

Which of the following should the analyst do to reduce the occurrence of legitimate failed logons and password resets?

An organization has several systems that require specific logons Over the past few months, the security analyst has noticed numerous failed logon attempts followed by password resets. Which of the following should the analyst do to reduce the occurrence of legitimate failed logons and password resets?A . Use SSO across...

Read more...