Which of the following is the MOST effective way to ensure information security policies are followed?

Posted by: Pdfprep Category: CISM Tags: , ,

Which of the following is the MOST effective way to ensure information security policies are followed?
A . Require sign-off on acceptable use policies.
B . Require regular security awareness training.
C . Provide detailed security procedures.
D . Perform a gap analysis.

Answer: C

Leave a Reply

Your email address will not be published.