Which of the following methods will you use to accomplish these tasks?

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks: Develop a risk-driven enterprise information security architecture. Deliver security
infrastructure solutions that support critical business initiatives. Which of the following methods will
you use to accomplish these tasks?

You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following
tasks: Develop a risk-driven enterprise information security architecture. Deliver security
infrastructure solutions that support critical business initiatives. Which of the following methods will
you use to accomplish these tasks?

A.
Service-oriented architecture

B.
Sherwood Applied Business Security Architecture

C.
Service-oriented modeling framework

D.
Service-oriented modeling and architecture



Leave a Reply 0

Your email address will not be published. Required fields are marked *