AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For
Warning: Undefined variable $vendor in /home1/bandbozu/getfreedumps.com/quiz.php on line 141
-
Warning: Undefined variable $exam_number in /home1/bandbozu/getfreedumps.com/quiz.php on line 141





Question ID 16869

The PRIMARY goal in developing an information security strategy is to:

Option A

establish security metrics and performance monitoring.

Option B

educate business process owners regarding their duties.

Option C

ensure that legal and regulatory requirements are met

Option D

support the business objectives of the organization.

Correct Answer D
Explanation Explanation: The business objectives of the organization supersede all other factors. Establishing metrics and measuring performance, meeting legal and regulatory requirements, and educating business process owners are all subordinate to this overall goal.


Question ID 16870

Explanation: The business objectives of the organization supersede all other factors. Establishing metrics and measuring performance, meeting legal and regulatory requirements, and educating business process owners are all subordinate to this overall goal.

Option A

Business controls designated as key controls

Option B

Security processes, methods, tools and techniques

Option C

Firewall rule sets, network defaults and intrusion detection system (IDS) settings

Option D

Budget estimates to acquire specific security tools

Correct Answer B
Explanation Explanation: A set of security objectives, processes, methods, tools and techniques together constitute a security strategy. Although IT and business governance are intertwined, business controls may not be included in a security strategy. Budgets will generally not be included in an information security strategy. Additionally, until information security strategy is formulated and implemented, specific tools will not be identified and specific cost estimates will not be available. Firewall rule sets, network defaults and intrusion detection system (IDS) settings are technical details subject to periodic change, and are not appropriate content for a strategy document.

Send email to admin@getfreedumps for new dumps request!!!