To justify the need to invest in a forensic analysis tool, an information security manager should FIRST:
A . review the functionalities and implementation requirements of the solution.
B . review comparison reports of tool implementation in peer companies.
C . provide examples of situations where such a tool would be useful.
D . substantiate the investment in meeting organizational needs.
Answer: D
Explanation:
Any investment must be reviewed to determine whether it is cost effective and supports the organizational strategy. It is important to review the features and functionalities provided by such a tool, and to provide examples of situations where the tool would be useful, but that comes after substantiating the investment and return on investment to the organization.