Which of the following is a benefit of information security governance?
Which of the following is a benefit of information security governance?
Investment in security technology and processes should be based on:
Investment in security technology and processes should be based on:
The data access requirements for an application should be determined by the:
The data access requirements for an application should be determined by the:
From an information security perspective, information that no longer supports the main purpose of the business
From an information security perspective, information that no longer supports the main purpose of
the business should be:
which is the MOST critical security consideration?
The organization has decided to outsource the majority of the IT department with a vendor that is
hosting servers in a foreign country. Of the following, which is the MOST critical security
consideration?
Effective IT governance is BEST ensured by:
Effective IT governance is BEST ensured by:
The FIRST step to create an internal culture that focuses on information security is to:
The FIRST step to create an internal culture that focuses on information security is to:
Which of the following is the BEST method or technique to ensure the effective implementation of an informatio
Which of the following is the BEST method or technique to ensure the effective implementation of
an information security program?
When an organization is implementing an information security governance program, its board of directors should
When an organization is implementing an information security governance program, its board of
directors should be responsible for:
Which of the following would be the BES T approach of the information security manager?
A risk assessment and business impact analysis (BIA) have been completed for a major proposed
purchase and new process for an organization. There is disagreement between the information
security manager and the business department manager who will own the process regarding the
results and the assigned risk. Which of the following would be the BES T approach of the
information security manager?