Users Online
· Guests Online: 13
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
Articles Hierarchy
Isaca- CISM
| Question ID 16808 |
Investment in security technology and processes should b e based on: |
| Option A |
clear alignment with the goals and objectives of the organization. |
| Option B |
success cases that have been experienced in previous projects. |
| Option C |
best business practices. |
| Option D |
safeguards that are inherent in existing technology. |
| Correct Answer | A |
Update Date and Time 2017-12-29 04:30:59
| Question ID 16809 |
A security manager is preparing a report to obtain the commitment of executive |
| Option A |
Examples of genuine incidents at similar organizations |
| Option B |
Statement of generally accepted best practices |
| Option C |
Associating realistic threats to corporate objectives |
| Option D |
Analysis of current technological exposures |
| Correct Answer | C |
Update Date and Time 2017-12-29 04:31:40
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.
