List three of the six common work functions specified in the EBK for the management process for risk management.
What will be an ideal response?
1. Establish an IT security risk management program based on enterprise business goals and objectives
2. Establish the risk assessment process
3. Advise senior management on the impact during the decision-making process by helping them understand and evaluate the impact of IT security risks on business goals, objectives, plans, programs, and actions
4. Acquire and manage the resources, including financial resources, necessary to conduct an effective risk management program
5. Make determination on acceptance of residual risk
6. Ensure that appropriate changes and improvement actions are implemented as required
You might also like to view...
A(n) ____________________ is useful for storing vertex information when the number of vertices can change.
A. dynamic hash table B. vertex hash table C. linked list D. priority queue
Write a tcpdump filter expression that, in addition to the constraints in Question 5, only captures packets using port number 23.
What will be an ideal response?
Which of the following is not included in an XML document type definition?
A) the number of times an element repeats B) an element that is optional C) the rules for transforming the XML document into standard output D) the attributes of an XML element
A terabyte is approximately how many characters?
A) one trillion B) one thousand C) one billion D) one million