The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
The PRIMARY benefit of implementing a security program as part of a security governance framework is the:
Which of the following should be the MOST important consideration when deciding areas of priority for IT gover
Which of the following should be the MOST important consideration when deciding areas of priority for IT governance implementation?
How would an information security manager balance the potentially conflicting requirements of an international
How would an information security manager balance the potentially conflicting requirements of an international organization’s security standards and local regulation?
Temporarily deactivating some monitoring processes, even if supported by an acceptance of operational risk, ma
Temporarily deactivating some monitoring processes, even if supported by an acceptance of operational risk, may not be acceptable to the information security manager if:
In order to highlight to management the importance of integrating information security in the business process
In order to highlight to management the importance of integrating information security in the business processes, a newly hired information security officer should FIRST:
As a driver of IT governance, transparency of IT’s cost, value and risks is primarily achieved through:
As a driver of IT governance, transparency of IT’s cost, value and risks is primarily achieved through:
Which of the following should be considered FIRST when implementing a risk management program?
Which of the following should be considered FIRST when implementing a risk management program?
A security manager meeting the requirements for the international flow of personal data will need to ensure:
A security manager meeting the requirements for the international flow of personal data will need to ensure:
Which of the following factors is a primary driver for information security governance that does not require a
Which of the following factors is a primary driver for information security governance that does not require any further justification?
Measures of security risk should:
An IS auditor is reviewing an IT security risk management program. Measures of security risk should: