. Question 33 . Generally in a risk assessment process , the first step is to . Question 34 .
The process that a business uses to safeguard assets , provide accurate and reliable information , and promote and improve operational efficiency is known as
. Question 35 .
According to the ERM , these help the company address all applicable laws and regulations .
. Question 36 . Which of the following is an example of a corrective control ? . Question 37 .
The process of turning off unnecessary features in the system is known as
. Question 38 .
The process that screens individual IP packets based solely on the contents of the source and / or destination fields in the packet header is known as
. Question 39 .
According to the Trust Services Framework , the reliability principle of integrity is achieved when the system produces data that
. Question 40 .
Compatibility tests utilize a ( n ) ________, which is a list of authorized users , programs , and data files the users are authorized to access or manipulate .