Which of the following is MOST likely to be included in an enterprise information security policy?

Posted by: Pdfprep Category: CISM Tags: , ,

Which of the following is MOST likely to be included in an enterprise information security policy?
A . Security monitoring strategy
B . Audit trail review requirements
C . Password composition requirements
D . Consequences of noncompliance

Answer: D

Leave a Reply

Your email address will not be published.