[Governance, Risk, and Compliance (GRC)] Which of the following best explains the importance of determining organization risk appetite when operating with a constrained budget?
[Security Engineering and Cryptography] Developers have been creating and managing cryptographic material on their personal laptops fix use in production environment. A security engineer needs to initiate a more secure process. Which of thefollowing is the best strategy for the engineer to use?
[Security Architecture] Users are willing passwords on paper because of the number of passwords needed in an environment. Which of the following solutions is the best way to manage this situation and decrease risks?
[Governance, Risk, and Compliance (GRC)] The material finding from a recent compliance audit indicate a company has an issue with excessive permissions. The findings show that employees changing roles or departments results in privilege creep. Which of the following solutions are the best ways to mitigate this issue? (Select two). Setting different access controls defined by business area
[Security Architecture] A security architect is establishing requirements to design resilience in un enterprise system trial will be extended to other physical locations. The system must • Be survivable to one environmental catastrophe • Re recoverable within 24 hours of critical loss of availability • Be resilient to active exploitation of one site-to-site VPN solution
[Identity and Access Management (IAM)] A security analyst is reviewing the following authentication logs: Which of thefollowing should the analyst do first?