ISC Exam Questions

A gap analysis for Security

A gap analysis for Security

A.
refers to the practice of trusting the security policies and practices currently in place in your
organization designed to protect all your data from unauthorized access, alternation or inadvertent
disclose.

B.
refers to the practice of modifying the security policies and practices currently in place in your
organization designed to protect all your data from unauthorized access, alteration or inadvertent
disclosure.

C.
refers to the practice of identifying the security policies and practices currently in place in your
organization designed to protect all your data from unauthorized access, alteration or inadvertent
disclosure.

D.
refers to the practice of improving the security policies and practices currently in place in your
organization designed to protect all your data from unauthorized access alteration or inadvertent
disclosure.

Explanation:
http://en.wikipedia.org/wiki/Gap_analysis
Gap analysis identifies gaps between the optimized allocation and integration of the inputs
(resources), and the current allocation level. This reveals areas that can be improved.