AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For
Warning: Undefined variable $vendor in /home1/bandbozu/getfreedumps.com/quiz.php on line 141
-
Warning: Undefined variable $exam_number in /home1/bandbozu/getfreedumps.com/quiz.php on line 141





Question ID 16838

Which of the following situations must be corrected FIRST to ensure successful information
security governance within an organization?

Option A

The information security department has difficulty filling vacancies.

Option B

The chief information officer (CIO) approves security policy changes.

Option C

The information security oversight committee only meets quarterly.

Option D

The data center manager has final signoff on all security projects.

Correct Answer D
Explanation Explanation: A steering committee should be in place to approve all security projects. The fact that the data center manager has final signoff for all security projects indicates that a steering committee is not being used and that information security is relegated to a subordinate place in the organization. This would indicate a failure of information security governance. It is not inappropriate for an oversight or steering committee to meet quarterly. Similarly, it may be desirable to have the chief information officer (CIO) approve the security policy due to the size of the organization and frequency of updates. Difficulty in filling vacancies is not uncommon due to the shortage of good, qualified information security professionals.


Question ID 16839

While implementing information security governance an organization should FIRST:

Option A

adopt security standards.

Option B

determine security baselines.

Option C

define the security strategy.

Option D

establish security policies.

Correct Answer C
Explanation Explanation: The first step in implementing information security governance is to define the security strategy based on which security baselines are determined. Adopting suitable security- standards, performing risk assessment and implementing security policy are steps that follow the definition of the security strategy.

Send email to admin@getfreedumps for new dumps request!!!