CISM - Certified Information Security Manager Practice Test
CISM Information Risk Management 2
Which of the following BEST describes 'inherent risk' in information security?
Select your answer
A
Risk remaining after controls are applied
B
Risk that exists before any controls are implemented
C
Risk transferred to a third party via insurance
D
Risk associated with third-party vendors only
Hint