Question 18:
Which of the following roles would represent a conflict of interest for an information security manager?
Answer options:
A. Evaluation of third parties requesting connectivity B. Assessment of the adequacy of disaster recovery plans C. Final approval of information security policies D. Monitoring adherence to physical security controls