Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?
A. Security governance
B. Risk management
C. Security portfolio management
D. Risk assessment

Download Printable PDF. VALID exam to help you PASS.

3 thoughts on “Which of the following entails identification of data and links to business processes, applications, and data stores as well as assignment of ownership responsibilities?

  1. B is correct answer.
    “6.3.3 Risk Management
    Effective risk management entails identification of technology assets; identification
    of data and its links to business processes, applications, and data
    stores; and assignment of ownership and custodial responsibilities.”

    Cloud Computing Implementation, Management, and Security
    John W. Rittinghouse James F. Ransome

  2. Its A.

    “Information security governance ensures that an organization has the correct information structure, leadership, and guidance. Risk Analysis (RA) helps ensure that an organization properly identifies, analyzes, and mitigates risk. “

    1
    2

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.