Question 72:
You work as a CSO (Chief Security Officer) for Tech Perfect Inc. You want to perform the following tasks: Develop a risk-driven enterprise information security architecture. Deliver security infrastructure solutions that support critical business initiatives. Which of the following methods will you use to accomplish these tasks?
Answer options:
A. Service-oriented architecture B. Sherwood Applied Business Security Architecture C. Service-oriented modeling framework D. Service-oriented modeling and architecture