Which of the following is an information security governance responsibility of the chief information security officer?

A. Develop policies and the program.
B. Set security policy, procedures, programs, and training.
C. Brief the board, customers, and the public.
D. Implement incident response programs to detect security vulnerabilities and breaches.


Answer: B

Computer Science & Information Technology

You might also like to view...

Visual Studio 2010 introduces a(n) ____________________, which guides you through the steps to create a basic report.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A manageable length for a filename is 24 to 30 characters, with an outside maximum of 511 characters.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Explain in detail what it means to evaluate sources and what the criteria for evaluation are.

What will be an ideal response?

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Which button do you click to add an address to your document? B. Which button do you click to specify how to handle errors that might occur during the merge? C. Which button do you click to replace merge fields with the actual data, so you can see what the document looks like? D. Which button do you click to choose the list of people you want to send the document to? E. Which button do you click to complete the mail merge?

Computer Science & Information Technology