Particular roles within the seven domains of a typical IT infrastructure are responsible for data handling and data quality. Which of the following individuals is responsible for maintaining the quality of data?
Blog
Arturo works for a product-testing company. He spends many h…
Arturo works for a product-testing company. He spends many hours testing the optimal settings for a piece of safety equipment used in factories. One day, the company experiences a power surge that alters the data stored in the testing database. As a result, the company uses incorrect data to recommend equipment settings and jeopardizes the safety of factory workers. Which of the following is most closely related to this scenario?
In the financial services sector, some organizations have im…
In the financial services sector, some organizations have implemented a three-lines-of defense model. What does the use of this model suggest about an organization’s structure?
Apathy can have detrimental effects on information security….
Apathy can have detrimental effects on information security. Engaged communication is one strategy that can be implemented to overcome the effects of apathy. Which of the following statements further elaborates this strategy?
__________ is a domain of the ISACA Risk IT framework that e…
__________ is a domain of the ISACA Risk IT framework that ensures that IT-related risk issues, opportunities, and events are addressed in a cost-effective manner and in line with business priorities.
True or False? An organization’s information security office…
True or False? An organization’s information security officer (ISO) is accountable for monitoring adherence to laws and regulations.
True or False? Data owners ensure that only the access neede…
True or False? Data owners ensure that only the access needed to perform day-to-day operations is granted and that duties are separated adequately to mitigate the risk of errors and fraud.
Implementing security policies is easier if you manage it fr…
Implementing security policies is easier if you manage it from a change model perspective. Which of the following change model steps requires leadership to back you and to establish a tone at the top for the need for the security policy?
All of the following are true of measuring the effectiveness…
All of the following are true of measuring the effectiveness of security policies, except:
An event that affects the entire organization operates, such…
An event that affects the entire organization operates, such as a merger or an acquisition, is best described as: