A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
What are the PRIMARY objectives of a control?
Which of the following is MOST important to understand when developing key risk indicators (KRIs)?