Which of the following topics is covered under the information security governance and risk management CBK domain?
A. Understanding forensic procedures
B. Following compliance requirements
C. Developing and implementing security policies
D. Understanding the fundamental concepts of security models
Answer: C
Explanation: The information security governance and risk management domain covers topics such as the need and importance of a comprehensive security plan, including the creation and management of security policies and employing risk management techniques.
You might also like to view...
Which of the statements will unhighlight any highlighted item in lstBox?
(A) lstBox.SelectedItem = Nothing (B) lstBox.SelectedItem = " " (C) lstBox.SelectedIndex = 0 (D) lstBox.SelectedIndex = -1
Write a recursive definition of xy (x raised to the power y), where x and y are integers and y > 0.
What will be an ideal response?
Factors that affect the external context and impact the RM process, its goals, and its objectives include the following EXCEPT:
A. the organization's governance structure B. the legal/regulatory/compliance environment-laws, regulations, industrystandards C. the business environment-customers, suppliers, competitors D. the threat environment-threats, known vulnerabilities, attack vectors
A user is unable to save a new presentation to the network U:\ drive. The error message indicates that there is no available space. Other users in the department are not experiencing any problems saving to the U:\ drive. Which of the following is the MOST likely cause of this issue?
A. The user does not have permissions to use the U:\ drive. B. The user's disk quota has been exceeded on the U:\drive. C. The user's local drive is out of space. D. The user does not have the U:\ drive mapped.