Which one of the following is not a key principle of the COBIT framework for IT security control objectives?
A. Meeting stakeholder needs
B. Performing exhaustive analysis
C. Covering the enterprise end-to-end
D. Separating governance from management
Answer: B. Performing exhaustive analysis
Computer Science & Information Technology
You might also like to view...
In order to get a shortcut menu to display, the user must ________-click on the selected object
Fill in the blank(s) with correct word
Computer Science & Information Technology
__________ is where the attacker forges a signature for a particular message chosen by the attacker.
A. Total break B. Universal forgery C. Existential forgery D. Selective forgery
Computer Science & Information Technology