Which of the following is the BEST defense against successful phishing attacks?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
When prioritizing risk response, management should FIRST:
A rule-based data loss prevention (DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?