Which one of the following is not a key principle of the COBIT framework for IT security control objectives?

A. Meeting stakeholder needs
B. Performing exhaustive analysis
C. Covering the enterprise end-to-end
D. Separating governance from management

Answer: B. Performing exhaustive analysis

Computer Science & Information Technology

You might also like to view...

In order to get a shortcut menu to display, the user must ________-click on the selected object

Fill in the blank(s) with correct word

Computer Science & Information Technology

__________ is where the attacker forges a signature for a particular message chosen by the attacker.

A. Total break B. Universal forgery C. Existential forgery D. Selective forgery

Computer Science & Information Technology