ExamQuestions.com

Register
Login
Certified Information Security Manager Exam Questions

Isaca

Certified Information Security Manager

264 / 500

Question 264:

Which of the following security activities should be implemented in the change management process to identify key vulnerabilities introduced by changes? 

Answer options:

A. Business impact analysis (BIA)
B. Penetration testing
C. Audit and review
D. Threat analysis