A compliance officer of a large organization has reviewed the firm's vendor management program but has discovered there are no controls defined to evaluate third-party risk or hardware source authenticity. The compliance officer wants to gain some level of assurance on a recurring basis regarding the implementation of controls by third parties. Which of the following would BEST satisfy the objectives defined by the compliance officer? (Choose two.)
A) Executing vendor compliance assessments against the organization's security controls
B) Executing NDAs prior to sharing critical data with third parties
C) Soliciting third-party audit reports on an annual basis
D) Maintaining and reviewing the organizational risk assessment on a quarterly basis
E) Completing a business impact assessment for all critical service providers
F) Utilizing DLP capabilities at both the endpoint and perimeter levels
Correct Answer:
Verified
Q11: Which of the following roles is ultimately
Q12: A security technician is testing a solution
Q13: A cybersecurity analyst has access to several
Q14: A security analyst is trying to determine
Q15: An information security analyst is reviewing backup
Q17: A security analyst reviews the following aggregated
Q18: An information security analyst observes anomalous behavior
Q19: A storage area network (SAN) was inadvertently
Q20: During an investigation, a security analyst determines
Q21: Because some clients have reported unauthorized activity
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents