Which of the following is the BEST way for an information security manager to identify compliance with information security policies within an organization?
A. Analyze system logs.
B. Conduct security awareness testing.
C. Perform vulnerability assessments.
D. Conduct periodic audits.
A. Analyze system logs.
B. Conduct security awareness testing.
C. Perform vulnerability assessments.
D. Conduct periodic audits.