Register
5:00
Stop
CISSP - Security Education and Awareness - Risk Management Process
Intermediate
1/5
An organization wants to implement a comprehensive Information Security Management System (ISMS). Which security policy should be developed first?
a.
Data Classification and Handling Policy
b.
Incident Response Policy
c.
Acceptable Use Policy
d.
Information Security Policy
Intermediate