When using the Governing for Enterprise Security (GES) program, an Enterprise Security Program (ESP) should be structured so that governance activities are driven by the organization's executive management, and so that it selects key stakeholders as well as the ____________.

A. Board Risk Committee
B. Board Finance Committee
C. Board Ethics Committee
D. Chairman of the Board


Answer: A

Computer Science & Information Technology

You might also like to view...

Compare connectionless (UDP) and connection-oriented (TCP) communication for the implementation of each of the following application-level or presentation-level protocols:

i) virtual terminal access (for example, Telnet); ii) file transfer (for example, FTP); iii) user location (for example, rwho, finger); iv) information browsing (for example, HTTP); v) remote procedure call.

Computer Science & Information Technology

The encapsulating security ____________________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A three-dimensional array consists of planes, rows, and columns.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Primary clustering occurs when data cluster around a home address.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology