Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify: