An information security manager must understand the relationship between information security and business ope
An information security manager must understand the relationship between information security
and business operations in order to:
The MOST effective approach to address issues that arise between IT management, business units and security ma
The MOST effective approach to address issues that arise between IT management, business
units and security management when implementing a new security strategy is for the information
security manager to:
Obtaining senior management support for establishing a warm site can BEST be accomplished by:
Obtaining senior management support for establishing a warm site can BEST be accomplished by:
Which of the following would be the BEST option to improve accountability for a system administrator who has s
Which of the following would be the BEST option to improve accountability for a system
administrator who has security functions?
Which of the following is the MOST important element of an information security strategy?
Which of the following is the MOST important element of an information security strategy?
Which factor will MOST influence the design of the Information security program?
A multinational organization operating in fifteen countries is considering implementing an
information security program. Which factor will MOST influence the design of the Information
security program?
Which of the following is the BEST justification to convince management to invest in an information security p
Which of the following is the BEST justification to convince management to invest in an
information security program?
On a company’s e-commerce web site, a good legal statement regarding data privacy should include:
On a company’s e-commerce web site, a good legal statement regarding data privacy should
include:
The MOST important factor in ensuring the success of an information security program is effective:
The MOST important factor in ensuring the success of an information security program is effective:
Which of the following would be MOST helpful to achieve alignment between information security and organizatio
Which of the following would be MOST helpful to achieve alignment between information security
and organization objectives?