An IT governance body wants to determine whether IT service delivery is based on consistently effective processes. Which of the following is the BEST approach?
This is according to the ISACA's IS Auditing Guideline G15 on Security Awareness Training, which states that security awareness training should include 'an understanding of the types of suspicious activity and the appropriate response to them'.
Norah
3 months agoLaura
3 months agoHana
3 months agoAlyce
4 months agoKattie
4 months agoGail
4 months agoEdna
4 months agoBecky
4 months agoFlo
5 months agoDana
5 months agoCory
5 months agoWillodean
5 months agoRyan
5 months agoThad
5 months agoMatthew
5 months agoIn
5 months agoRosamond
9 months agoShenika
9 months agoMabel
8 months agoCarma
8 months agoDylan
9 months agoChanel
9 months agoKarl
10 months agoLai
8 months agoDoug
8 months agoLorita
9 months agoAaron
10 months agoStephen
9 months agoSkye
9 months agoPatrick
9 months agoLuisa
9 months agoOtis
10 months agoShalon
10 months agoLizette
10 months agoFabiola
11 months agoDomingo
11 months agoLizette
11 months ago