Question: To justify the need to invest in a forensic analysis tool, an information security manager should FIRST:
A.) review the functionalities and implementation requirements of the solution.
B.) review comparison reports of tool implementation in peer companies.
C.) provide examples of situations where such a tool would be useful.
D.) substantiate the investment in meeting organizational needs.

Download pdf (with explanations) edition of this exam.