To ensure appropriate control of information processed in IT systems, security safeguards should be based PRIMARILY on:
A . criteria consistent with classification levels
B . efficient technical processing considerations,
C . overall IT capacity and operational constraints,
D . established guidelines
Answer: A
Latest CISM Dumps Valid Version with 1327 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund