GIAC GCPM Question Answer
You are using the PDCA model to determine, implement, monitor, control, and maintain Information Security Management System or ISMS. You have to evaluate the new processes and match up to the results against the probable results to determine the differences. In which of the following phases of the PDCA are you working?