1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment foran IT Infrastructure lab in this lab manual, what is the primary focus of your message to executivemanagement?3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have onprioritizing your identified risks, threats, and vulnerabilities?4. What risk-mitigation solutions do you recommend for handling the following risk element: Userinserts CDs and USB hard drives with personal photos, music, and videos on organization-ownedcomputers?5. What is a security baseline definition?6. What questions do you have for executive management to finalize your IT risk-mitigation plan?7. What is the most important risk-mitigation requirement you uncovered and want to communicateto executive management? In your opinion, why is this the most important risk-mitigationrequirement?8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-termrisk-mitigation tasks and ongoing duties?9. For which of the seven domains of a typical IT infrastructure is it easy to implement riskmitigationsolutions but difficult to monitor and track effectiveness?10. Which of the seven domains of a typical IT infrastructure usually contains privacy data insystems, servers, and databases?11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store iton local hard drives and disks?12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?13. When considering the implementation of software updates, software patches, and software fixes,why must you test the upgrade or software patch before you implement it as a risk-mitigationtactic?14. Are risk-mitigation policies, standards, procedures, and guidelines needed as part of your longtermrisk-mitigation plan? Why or why not?15. If an organization under a compliance law is not in compliance, how critical is it for yourorganization to mitigate this noncompliance risk element?