Users Online
· Guests Online: 101
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
Articles Hierarchy
Isaca- CISM
Question ID 16812 |
An information security manager must understand the relationship between information |
Option A |
support organizational objectives. |
Option B |
determine likely areas of noncompliance. |
Option C |
assess the possible impacts of compromise. |
Option D |
understand the threats to the business. |
Correct Answer | A |
Update Date and Time 2017-12-29 04:36:18
Question ID 16813 |
Which of the following should be the FIRST step in developing an information security |
Option A |
Perform a technical vulnerabilities assessment |
Option B |
Analyze the current business strategy |
Option C |
Perform a business impact analysis |
Option D |
Assess the current levels of security awareness |
Correct Answer | B |
Description Explanation: Prior to assessing technical vulnerabilities or levels of security awareness, an information security manager needs to gain an understanding of the current business strategy and direction. A business impact analysis should be performed prior to developing a business continuity plan, but this would not be an appropriate first step in developing an information security strategy because it focuses on availability.
Update Date and Time 2017-12-29 04:37:12
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.