A Contingency Planning (CP) team lead suggests bypassing the…

A Contingency Planning (CP) team lead suggests bypassing the formal Business Impact Analysis (BIA) phase to proceed directly to drafting recovery plans, arguing that “we already intuitively know which systems are critical.” What is the MOST significant risk created by this shortcut?

A vulnerability scanner identifies a critical CVE on a serve…

A vulnerability scanner identifies a critical CVE on a server that was classified as “acceptable risk” by a previous analyst 18 months ago. The current analyst seeks to reclassify it for immediate remediation. According to the “vulnerability assessment and remediation” domain of the Cybersecurity Maintenance Model, which of the following is the most appropriate perspective?

An organization needs to securely exchange sensitive data wi…

An organization needs to securely exchange sensitive data with hundreds of external business partners for the first time. Relying solely on symmetric encryption would require a unique secret key for every partner, creating a massive key distribution challenge. Which cryptographic mechanism MOST directly solves this problem?