Spring Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ac4s65

An information security manager finds a legacy application has no defined data owner.

An information security manager finds a legacy application has no defined data owner. Of the following, who would be MOST helpful in identifying the appropriate data owner?

A.

The individual who has the most privileges within the application

B.

The individual who manages the process supported by the application

C.

The individual responsible for providing support for the application

D.

The individual who manages users of the application

CISM PDF/Engine
  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions
buy now CISM pdf
Get 65% Discount on All Products, Use Coupon: "ac4s65"