List of questions
Related questions
Question 123 - CISM discussion
Information security controls should be designed PRIMARILY based on:
A.
a business impact analysis (BIA).
B.
regulatory requirements.
C.
business risk scenarios,
D.
a vulnerability assessment.
Your answer:
0 comments
Sorted by
Leave a comment first