CISA Certified Information Systems Auditor – Question2737

Which of the following programs would a sound information security policy MOST likely include to handle suspected intrusions?

A.
Response
B. Correction
C. Detection
D. Monitoring

Correct Answer: A

Explanation:

Explanation:
A sound IS security policy will most likely outline a response program to handle suspected intrusions. Correction, detection and monitoring programs are all aspects of information security, but will not likely be included in an IS security policy statement.