List of questions
Related questions
Question 33 - CISM discussion
Which of the following is MOST important to include in a post-incident review following a data breach?
A.
An evaluation of the effectiveness of the information security strategy
B.
Evaluations of the adequacy of existing controls
C.
Documentation of regulatory reporting requirements
D.
A review of the forensics chain of custom
Your answer:
0 comments
Sorted by
Leave a comment first