An IT audit reveals inconsistent maintenance of data privacy in enterprise systems primarily due to a lack of data sensitivity categorizations. Once the categorizations are defined, what is the BEST long-term strategic response by IT governance to address this problem?
Beth is a project team member on the JHG Project. Beth has added extra features to the project and this has introduced new risks to the project work. The project manager of the JHG project elects to remove the features Beth has added. The process of removing the extra features to remove the risks is called what?
Establishing a uniform definition for likelihood and impact through risk management standards PRIMARILY addresses which of the following concerns?
Which of the following components of a policy BEST enables the governance of enterprise IT?
Fred is the project manager of the PKL project. He is working with his project team to
complete the quantitative risk analysis process as a part of risk management planning.
Fred understands that once the quantitative risk analysis process is complete, the process will need to be completed again in at least two other times in the project. When will the quantitative risk analysis process need to be repeated?