100%(1)1 out of 1 people found this document helpful
This preview shows page 3 - 4 out of 4 pages.
QUESTION 15Business leaders rely on technology roles to be accountable for implementing security policies,monitoring their adherence, and managing day-to-day activities. The role of ______________, forexample, is to be accountable for ensuring only the access that is needed to perform day-to-dayoperations is granted4 points SavedSaveddata ownerdata managerdata userdata custodianQUESTION 16Security controls are measures taken to protect systems from attacks on the integrity, confidentiality,and availability of the system. If a potential employee is required to undergo a drug screening, which ofthe following controls is being conducted?4 points SavedSavedQUESTION 17In order to be thoughtful about the implementation of security policies and controls, leaders mustbalance the need to reduce______________ with the impact to the business operations. Doing socould mean phasing security controls in over time or be as simple as aligning security implementationwith the business’s training events.4 points SavedSavedQUESTION 18Which of the following topics describes the process of building security into applications?4 points SavedSavedQUESTION 19The ________________ domain ensures risks are diminished and remediated in the most cost-effective manner. To prevent risk from increasing in severity and scope, this domain coordinates riskresponses ensuring that the right people are engaged when appropriate.risk responserisk governancerisk evaluationrisk acceptance4 points SavedQUESTION 20In a large organization, the complexity required to keep operations running effectively requires ahierarchy of specialties. Thus, which of following organizational structures is preferred?4 points SavedSave All AnsweSave All AnsweClick Save and Submit to save and submit. Click Save All Answers to save all answers.