Which of the following is the MOST important consideration when defining security configuration baselines? A. The baselines address applicable regulatory standards. B. The baselines are proportionate to risk. C. The baselines address known system vulnerabilities. D. The baselines align with lines of business. Suggested Answer: B This question is in CISM exam For getting Certified Information Security Manager Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer