List of questions
Related questions
Question 458 - CISM discussion
When management changes the enterprise business strategy which of the following processes should be used to evaluate the existing information security controls as well as to select new information security controls?
A.
Configuration management
B.
Risk management
C.
Access control management
D.
Change management
Your answer:
0 comments
Sorted by
Leave a comment first