which approach would be used if senior management is supporting and enforcing the security policy?

When creating a security program, which approach would be used if senior management is
supporting and enforcing the security policy?

When creating a security program, which approach would be used if senior management is
supporting and enforcing the security policy?

A.
A bottom-up approach

B.
A top-down approach

C.
A senior creation approach

D.
An IT assurance approach



Leave a Reply 2

Your email address will not be published. Required fields are marked *


jay

jay

This was in my CISSP course but never mentioned or discussed when I took the official EC-council course