Which of the following methods BEST ensures that a comprehensive approach is used to direct information security activities?
An internal audit has identified major weaknesses over IT processing. Which of the following should an information security manager use to BEST convey a sense of urgency to management?
Which of the following processes if the FIRST step in establishing an information security policy?
A data-hosting organization's data center houses servers, applications, and data for a large number of geographically dispersed customers. Which of the following strategies would be the BEST approach for developing a physical access control policy for the organization?
What is the PRIMARY benefit to executive management when audit risk, and security functions are aligned?