Which of the following processes is the FIRST step in establishing an information security policy?

Which of the following processes is the FIRST step in establishing an information security policy?
A . Review of current global standards
B . Business risk assessment
C . Security controls evaluation
D . Information security audit

Answer: B

Latest CISM Dumps Valid Version with 1327 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments