Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?
Which of the following includes potential risk events and the associated impact?