ISACA Exam Questions

Which of the following programs would a sound information security policy MOST likely include to han

Which of the following programs would a sound information security policy MOST likely include to
handle suspected intrusions?

A.
Response

B.
Correction

C.
Detection

D.
Monitoring

Explanation:

A sound IS security policy will most likely outline a response program to handle suspected
intrusions. Correction, detection and monitoring programs are all aspects of information security,
but will not likely be included in an IS security policy statement.