Question: 1.in an information security policy architecutre, which document is based on the corporate and declailed plicies a. Board-intiated Directive b. corporate information security policy c.
1.in an information security policy architecutre, which document is based on the corporate and declailed plicies
a. Board-intiated Directive
b. corporate information security policy
c. set company standards
d. set of Admistrative and operational procedures
2. which key area of COBIT 5 do the plan, Build, Run and monitor processes fall under?
a. Governance
b. Management
c. support
d. Awareness
3. which management domain of COBIT 5 deals specifically with compliance?
a. Buil, acquire and implement (BAI)
b.Align, plan and organize (APO)
c.Monitor, Evaluate and assess (MEA)
d. Deliver, service and support (DSS)
4. which of the following characteristics should compliance enforcement not exhibit?
a. Immediate
b.Real-time
c.Static
d.Dynamic
5. which clause in IS0 27002 is dedicated to compliance?
a. clause 10
b.clause 5
c.clause 15
d.clause 13
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
