An information security manager finds a legacy application has no defined data owner. Of the following, who would be MOST helpful in identifying the appropriate data owner?
A.
The individual responsible for providing support for the application
B.
The individual who manages the process supported by the application
C.
The individual who manages users of the application
D.
The individual who has the most privileges within the application
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ServerBrain
8 months, 3 weeks agooluchecpoint
1 year, 4 months agoAgamennore
1 year, 10 months agochanke
2 years agorichck102
2 years agoMyKasala
2 years, 5 months agoMyKasala
2 years, 5 months agoMyKasala
2 years, 5 months ago