AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For
Warning: Undefined variable $vendor in /home1/bandbozu/getfreedumps.com/quiz.php on line 141
-
Warning: Undefined variable $exam_number in /home1/bandbozu/getfreedumps.com/quiz.php on line 141





Question ID 16927

Which of the following should be included in an annual information security budget that is
submitted for management approval?

Option A

A cost-benefit analysis of budgeted resources

Option B

All of the resources that are recommended by the business

Option C

Total cost of ownership (TC'O)

Option D

Baseline comparisons

Correct Answer A
Explanation Explanation: A brief explanation of the benefit of expenditures in the budget helps to convey the context of how the purchases that are being requested meet goals and objectives, which in turn helps build credibility for the information security function or program. Explanations of benefits also help engage senior management in the support of the information security program. While the budget should consider all inputs and recommendations that are received from the business, the budget that is ultimately submitted to management for approval should include only those elements that are intended for purchase. TC'O may be requested by management and may be provided in an addendum to a given purchase request, but is not usually included in an annual budget. Baseline comparisons (cost comparisons with other companies or industries) may be useful in developing a budget or providing justification in an internal review for an individual purchase, but would not be included with a request for budget approval.


Question ID 16928

Which of the following characteristics is MOST important when looking at prospective
candidates for the role of chief information security officer (CISO)?

Option A

Knowledge of information technology platforms, networks and development methodologies

Option B

Ability to understand and map organizational needs to security technologies

Option C

Knowledge of the regulatory environment and project management techniques

Option D

Ability to manage a diverse group of individuals and resources across an organization

Correct Answer B
Explanation Explanation: Information security will be properly aligned with the goals of the business only with the ability to understand and map organizational needs to enable security technologies. All of the other choices are important but secondary to meeting business security needs.

Send email to admin@getfreedumps for new dumps request!!!