List the four competencies identified in the EBK that are associated with the design of a strategic management function.
What will be an ideal response?
1. Establish a performance management program that will measure the efficiency, effectiveness, and maturity of the IT security program in support of the organization's business/mission needs
2. Develop IT security program components and associated strategy to support the organization's IT security program
3. Develop information security management strategic plans
4. Integrate applicable laws and regulations into enterprise information security strategy, plans, policies, and procedures
You might also like to view...
Which of the following is NOT a major part of an autonomous access point?
A. antenna B. wired network interface C. bridging software D. wireless switch
CSS positions can be either absolute or ________.
a) static b) relative c) transferred d) disabled
To indicate the passing of an array in a prototype or header function you must have:
A. data type variable name [ ]. B. variable name data type [ ]. C. *Parentheses ( ). D. No indication is necessary. The program intuitively knows what you are doing.
The sum of squares can be defined as ____.
A. (num) + sumOfSquares(num - 1) B. (num / num) + sumOfSquares(num - 1) C. (num * num) + sumOfSquares(num - 1) D. (num * num) + sumOfSquares(num)