Users Online
· Guests Online: 11
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
Articles Hierarchy
Isaca- CISM
Question ID 16814 |
Information security governance is PRIMARILY driven by: |
Option A |
technology constraints. |
Option B |
regulatory requirements. |
Option C |
litigation potential. |
Option D |
business strategy. |
Correct Answer | D |
Update Date and Time 2017-12-29 04:37:52
Question ID 16815 |
When developing an information security program, what is the MOST useful source of |
Option A |
Proficiency test |
Option B |
Job descriptions |
Option C |
Organization chart |
Option D |
Skills inventory |
Correct Answer | D |
Description Explanation: A skills inventory would help identify- the available resources, any gaps and the training requirements for developing resources. Proficiency testing is useful but only with regard to specific technical skills. Job descriptions would not be as useful since they may be out of date or not sufficiently detailed. An organization chart would not provide the details necessary to determine the resources required for this activity.
Update Date and Time 2017-12-29 04:38:28
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.