List 5 of the 11 specific competencies dictated by the EBK for the ISO function.
What will be an ideal response?
Manage, design, and evaluate data security
Manage and design digital forensics
Manage and evaluate enterprise continuity
Manage, design, and evaluate incident management
Manage and evaluate IT security training and awareness
Manage and evaluate physical and environmental security
Manage, design, and evaluate procurement
Manage, design, and evaluate regulatory and standards compliance
Manage, design, and evaluate risk management
Manage, design, implement, and evaluate strategic management
Manage and evaluate system and application security
You might also like to view...
A(n) ________ query enables you to create a new table or change data in an existing table
Fill in the blank(s) with correct word
Predefined documents that define basic settings, such as fonts, margins, and styles are called ________
Fill in the blank(s) with correct word
The proofing options included in Word 2013 eliminate the need for you to apply your own proofreading skills
Indicate whether the statement is true or false
An access ______ is a security measure that defines who can access a computer, device, or network.
Fill in the blank(s) with the appropriate word(s).