GOVERNANCE - Information security strategy objectives - Desired state

4 important questions on GOVERNANCE - Information security strategy objectives - Desired state

What is meant by "desired state"

Snapshot of all relevant conditions at a particular point in the future

What is the COBIT 5 Process Assessment Tool (PAM)?

A tool that can be used to assess the current state and define a future state for information security.

Where does EISA stand for

Enterprise Information Security Architecture
  • Higher grades + faster learning
  • Never study anything twice
  • 100% sure, 100% understanding
Discover Study Smart

Which models can be used to define the desired state of security?


  • COBIT5
  • Open Group Architecture Framework (TOGAF)
  • Zachman Enterprise Architecture Framework
  • Extended Enterprise Architecture Framework (E2AF)

The question on the page originate from the summary of the following study material:

  • A unique study and practice tool
  • Never study anything twice again
  • Get the grades you hope for
  • 100% sure, 100% understanding
Remember faster, study better. Scientifically proven.
Trustpilot Logo