Which of the following should be of MOST influence to an information security manager when developing IT security policies?

Posted by: Pdfprep Category: CISA Tags: , ,

Which of the following should be of MOST influence to an information security manager when developing IT security policies?
A . Past and current threats
B . IT security framework
C . Compliance with regulations
D . Business strategy

Answer: D

Leave a Reply

Your email address will not be published.