Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?

Posted by: Pdfprep Category: CISM Tags: , ,

Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?
A . Make backups of the affected systems prior to transfer.
B . Increase cyber insurance coverage.
C . Identify all information assets in the legacy environment.
D . Assign owners to be responsible for the transfer of each asset.

Answer: C

Leave a Reply

Your email address will not be published.