Question 365:
A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?
Answer options:
A. Risk analysis results B. Audit report findings C. Penetration test results D. Amount of IT budget available