exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 83 discussion

Actual exam question from Isaca's CISM
Question #: 83
Topic #: 1
[All CISM Questions]

Which of the following should be done FIRST when establishing security measures for personal data stored and processed on a human resources management system?

  • A. Conduct a vulnerability assessment.
  • B. Move the system into a separate network.
  • C. Conduct a privacy impact assessment (PIA).
  • D. Evaluate data encryption technologies.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lj22HI
3 months ago
Selected Answer: C
A Privacy Impact Assessment (PIA) should be conducted first to define the necessary privacy protections and ensure compliance with data regulations. Then, a vulnerability assessment follows to address technical weaknesses in securing that personal data. Think of it like building a secure house: PIA (Privacy Assessment) → Foundation & Design → Ensures the structure complies with safety codes and privacy requirements. Vulnerability Assessment → Security Reinforcement → Checks for weaknesses like unlocked doors, exposed windows, or faulty locks. Each assessment has a distinct purpose, but performing them in the right order ensures security measures align with both technical and privacy needs.
upvoted 1 times
...
GAAMMC
6 months, 2 weeks ago
Selected Answer: A
How can you conduct a PIA before you know the vulnerability?
upvoted 1 times
...
GAAMMC
6 months, 2 weeks ago
Selected Answer: C
How can you conduct a PIA before you know the vulnerability?
upvoted 1 times
...
Viperhunter
8 months, 4 weeks ago
Selected Answer: C
Conducting a privacy impact assessment (PIA) is a crucial initial step to identify and assess the potential privacy risks and impacts associated with the processing of personal data on the human resources management system. A PIA helps organizations understand the privacy implications of their data processing activities and ensures that adequate security measures are implemented to protect personal information. While other options such as conducting a vulnerability assessment (Option A), evaluating data encryption technologies (Option D), and considering network segmentation (Option B) are important aspects of securing personal data, conducting a PIA is a fundamental and proactive measure to address privacy concerns and compliance requirements from the outset.
upvoted 1 times
...
sphenixfire
11 months, 1 week ago
Selected Answer: C
would say c
upvoted 1 times
...
oluchecpoint
11 months, 2 weeks ago
C. Conduct a privacy impact assessment (PIA). A privacy impact assessment (PIA) is a crucial initial step in understanding the potential risks and privacy implications of processing personal data. It helps identify and assess privacy risks associated with the system, including how personal data is collected, used, stored, and shared. This assessment informs the development of appropriate security measures. After conducting a PIA, you can then proceed with other security measures such as conducting a vulnerability assessment (A), evaluating data encryption technologies (D), and considering network segmentation (B) to enhance the security of the system. However, understanding the privacy risks and requirements through a PIA is essential for making informed decisions about the security measures that need to be implemented.
upvoted 1 times
...
karanvp
1 year, 1 month ago
Answer C: First need to identify what are the PII / Sensitive / Confidential informations captured in HRMS. Assessment is required to do that
upvoted 3 times
...
CrackyPatch
1 year, 2 months ago
Selected Answer: C
PIA is on C now
upvoted 3 times
...
Awkspikey
1 year, 2 months ago
Selected Answer: B
Conduct a privacy impact assessment (PIA).
upvoted 1 times
...
DASH_v
1 year, 2 months ago
Selected Answer: B
PIA first, which gives IS manager the input of the data senstivity level so to determine the assessment methdologies & security controls required.
upvoted 1 times
...
richck102
1 year, 3 months ago
Selected Answer: A
A. Conduct a vulnerability assessment.
upvoted 1 times
DERCHEF2009
1 year, 2 months ago
Wrong! Do a PIA is correct!
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...