Users Online

· Guests Online: 11

· Members Online: 0

· Total Members: 188
· Newest Member: meenachowdary055

Forum Threads

Newest Threads
No Threads created
Hottest Threads
No Threads created

Latest Articles

Articles Hierarchy

Isaca- CISM

Question ID 16814

Information security governance is PRIMARILY driven by:

Option A

technology constraints.

Option B

regulatory requirements.

Option C

litigation potential.

Option D

business strategy.

Correct Answer D
Description Explanation: Governance is directly tied to the strategy and direction of the business. Technology constraints, regulatory requirements and litigation potential are all important factors, but they are necessarily in line with the business strategy.
Update Date and Time 2017-12-29 04:37:52

 

Question ID 16815

When developing an information security program, what is the MOST useful source of
information for determining available resources?

Option A

Proficiency test

Option B

Job descriptions

Option C

Organization chart

Option D

Skills inventory

Correct Answer D

Description Explanation: A skills inventory would help identify- the available resources, any gaps and the training requirements for developing resources. Proficiency testing is useful but only with regard to specific technical skills. Job descriptions would not be as useful since they may be out of date or not sufficiently detailed. An organization chart would not provide the details necessary to determine the resources required for this activity.
Update Date and Time 2017-12-29 04:38:28

 

 

Comments

No Comments have been Posted.

Post Comment

Please Login to Post a Comment.

Ratings

Rating is available to Members only.

Please login or register to vote.

No Ratings have been Posted.
Render time: 0.77 seconds
10,840,898 unique visits