Isaca CGEIT Question Answer
A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:
confirm process owners' acceptance of residual risk.
perform an internal and external network penetration test.
obtain IT security approval on security policy exceptions.