When using the Governing for Enterprise Security (GES) program, an Enterprise Security Program (ESP) should be structured so that governance activities are driven by the organization's executive management, and so that it selects key stakeholders as well as the ____________.
A. Board Risk Committee
B. Board Finance Committee
C. Board Ethics Committee
D. Chairman of the Board
Answer: A
You might also like to view...
Compare connectionless (UDP) and connection-oriented (TCP) communication for the implementation of each of the following application-level or presentation-level protocols:
i) virtual terminal access (for example, Telnet); ii) file transfer (for example, FTP); iii) user location (for example, rwho, finger); iv) information browsing (for example, HTTP); v) remote procedure call.
The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
Fill in the blank(s) with the appropriate word(s).
A three-dimensional array consists of planes, rows, and columns.
Answer the following statement true (T) or false (F)
Primary clustering occurs when data cluster around a home address.
Answer the following statement true (T) or false (F)