QUESTION 22The security posture of an organization is usually expressed in terms of ___________________, whichgenerally refers to how much risk an organization is willing to accept to achieve its goal, and____________________, which relates how much variance in the process an organization will accept.risk assessment, risk manageabilityrisk tolerance, risk appetiterisk awareness, risk reductionrisk appetite, risk tolerance2.5 points SavedSavedQUESTION 23The _______________________domain establishes the context and business view for a riskevaluation and guarantees that risk activity aligns with the business goals, objectives, and tolerances.The ________________ domain establishes that technology risks are identified and delivered toleadership in business terms.2.5 points SavedSavedQUESTION 24The concept of _________________ comes from the acknowledgment that data changes form and2.5 points SavedSavedQUESTION 25The NIST SP 800-53, “Recommended Security Controls for Federal Information Systems” was writtenusing a popular risk management approach. Which of the following control areas best fits thisdescription: “This is the area in which an organization develops, documents, periodically updates, andimplements security plans for information systems”?2.5 points SavedSavedQUESTION 26As a result of a U.S. Supreme Court ruling challenging the restriction of access to information inlibraries, the ________________ was declared constitutional. However, the courts do require schoolsand libraries to unblock sites when requested by an adult.Sarbanes-Oxley (SOX) ActGramm-Leach-Bliley Act (GLBA)Federal Information Security Management Act (FISMA)Children’s Internet Protection Act (CIPA)2.5 points SavedSavedQUESTION 27It is important for an organization to determine how it wants to manage ____________________, whichmeans how to group various tasks, and____________________, which relates to the number of layersand number of direct reports found in an organization.2.5 points SavedSaved