Which of the following are the steps usually followed in the development of documents such as security policy, standards and procedures?
A . design, development, publication, coding, and testing.
B . design, evaluation, approval, publication, and implementation.
C . initiation, evaluation, development, approval, publication, implementation, and maintenance.
D . feasibility, development, approval, implementation, and integration.
Answer: C
Explanation: The common steps used the the development of security policy are initiation of the project, evaluation, development, approval, publication, implementation, and maintenance. The other choices listed are the phases of the software development life cycle and not the step used to develop ducuments such as Policies, Standards, etc…
Explanation: TIPTON, Harold F. & KRAUSE, MICKI, Information Security Management Handbook, 4th Edition, Volume 3, 2002, Auerbach Publications.
Latest SSCP Dumps Valid Version with 1074 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund