An ISACA certification targeted at IT professionals who are in careers that link IT risk management with enterprise risk management is known as the __________.

A. CGEIT
B. CISM
C. CISSP
D. CRISC


Answer: D

Computer Science & Information Technology

You might also like to view...

Alice function_______ takes the time to wait as the first argument and a function to call when that time quantum expires.

a) Alarm. b) SetTimer. c) SetAlarm. d) None of the above.

Computer Science & Information Technology

Objects on ____ layers cannot be selected.

A. locked B. hidden C. sealed D. buried

Computer Science & Information Technology

Use your intuition and the appropriate definition to determine whether the variation between these variables is direct or inverse.The time required to fill a swimming pool and the amount of water coming in from the hose.

What will be an ideal response?

Computer Science & Information Technology

A _____ can be appended to a character type or set to specify the number of occurrences for a particular character or group of characters.

A. certificate B. quantifier C. scope D. model group

Computer Science & Information Technology