exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 184 discussion

Actual exam question from Isaca's CISM
Question #: 184
Topic #: 1
[All CISM Questions]

Which of the following is the MOST effective method of determining security priorities?

  • A. Vulnerability assessment
  • B. Gap analysis
  • C. Threat assessment
  • D. Impact analysis
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
e891cd1
10 months, 1 week ago
D. Business impact analyst is also a prerequisite for a Business Continuity Plan that assess disruption to assets and the criticality to business continuation. Hence; you can prioritize your critical assets.
upvoted 1 times
...
Hugo1717
1 year, 5 months ago
Selected Answer: D
The correct answer is D. Impact analysis. Explanation: Impact analysis is the most effective method of determining security priorities because it focuses on assessing the potential consequences of security incidents or breaches. When determining security priorities, it's important to understand the potential impact that various security threats or vulnerabilities could have on the organization. By analyzing the potential impact, you can prioritize security measures based on the severity of the consequences.
upvoted 2 times
...
richck102
1 year, 7 months ago
Selected Answer: D
D. Impact analysis
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...