Which one of the following is not a key principle of the COBIT framework for IT security control objectives?

A. Meeting stakeholder needs
B. Performing exhaustive analysis
C. Covering the enterprise end-to-end
D. Separating governance from management


Answer: B. Performing exhaustive analysis

Computer Science & Information Technology

You might also like to view...

You can initialize fundamental-type data members in their declarations. This is known as a(n) ________ initializer and was introduced in C++11.

a. explicit b. implicit c. global d. in-class initializer

Computer Science & Information Technology

In Windows Vista, any folder can become a toolbar

Indicate whether the statement is true or false

Computer Science & Information Technology

If the probability of failure of a single drive is 0.000001 per 1,000 hours, what is the probability of failure if exactly:

a. one drive in an array of four fails? b. two drives in an array of four fails?

Computer Science & Information Technology

How is a user slice identified?

A. Solid line border B. Yellow dotted line C. Blue dotted line D. No line

Computer Science & Information Technology