Which of the following is the MOST important constraint to be considered when developing an information security strategy? A. Established security policies and standards B. Information security architecture C. Compliance with an international security standard D. Legal and regulatory requirements Suggested Answer: D This question is in CISM exam For getting Certified Information Security Manager Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by ISACA. The website does not contain actual questions and answers from ISACA's Certification Exams. Trademarks, certification & product names are used for reference only and belong to ISACA.
Please login or Register to submit your answer