The FIRST step in establishing a security governance program is to?
B
Which of the following has the GREATEST impact on the implementation of an information security
governance model?
D
From an information security perspective, information that no longer supports the main purpose of
the business should be:
D
When briefing senior management on the creation of a governance process, the MOST important
aspect should be:
D
Which of the following most commonly falls within the scope of an information security governance
steering committee?
D
A security professional has been promoted to be the CISO of an organization. The first task is to
create a security policy for this organization. The CISO creates and publishes the security policy. This
policy however, is ignored and not enforced consistently. Which of the following is the MOST likely
reason for the policy shortcomings?
B
Which of the following is the MAIN reason to follow a formal risk management process in an
organization that hosts and uses privately identifiable information (PII) as part of their business
models and processes?
C
The alerting, monitoring and life-cycle management of security related events is typically handled by
the
A
One of the MAIN goals of a Business Continuity Plan is to
C
When managing an Information Security Program, which of the following is of MOST importance in
order to influence the culture of an organization?
B