List the four competencies identified in the EBK that are associated with the design of a strategic management function.

What will be an ideal response?


1. Establish a performance management program that will measure the efficiency, effectiveness, and maturity of the IT security program in support of the organization's business/mission needs
2. Develop IT security program components and associated strategy to support the organization's IT security program
3. Develop information security management strategic plans
4. Integrate applicable laws and regulations into enterprise information security strategy, plans, policies, and procedures

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a major part of an autonomous access point?

A. antenna B. wired network interface C. bridging software D. wireless switch

Computer Science & Information Technology

CSS positions can be either absolute or ________.

a) static b) relative c) transferred d) disabled

Computer Science & Information Technology

To indicate the passing of an array in a prototype or header function you must have:

A. data type variable name [ ]. B. variable name data type [ ]. C. *Parentheses ( ). D. No indication is necessary. The program intuitively knows what you are doing.

Computer Science & Information Technology

The sum of squares can be defined as ____.

A. (num) + sumOfSquares(num - 1) B. (num / num) + sumOfSquares(num - 1) C. (num * num) + sumOfSquares(num - 1) D. (num * num) + sumOfSquares(num)

Computer Science & Information Technology