exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 481 discussion

Actual exam question from Isaca's CISM
Question #: 481
Topic #: 1
[All CISM Questions]

Which of the following is the BEST indication of a mature information security program?

  • A. Security spending is below budget.
  • B. Security incidents are managed properly.
  • C. Security resources are optimized.
  • D. Security audit findings are reduced.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 9 months ago
Selected Answer: B
B. Security incidents are managed properly is the BEST indication of a mature information security program. A mature information security program is one that is able to effectively identify, respond to and recover from security incidents. This includes having robust incident management processes in place, such as incident response plans, incident response teams, and incident management procedures. Additionally, it includes having the necessary resources and capabilities to effectively detect, contain, and remediate incidents. A mature information security program should also be able to measure the effectiveness of its incident management processes and use the data to continuously improve the program. The other options are also important but they are more focused on the efficiency and effectiveness of the program rather than its ability to handle incidents.
upvoted 9 times
karanvp
1 year, 4 months ago
The keyword is "indicate". "Security incidents are managed properly" can't indicate anything; but option D does.
upvoted 2 times
...
...
aokisan
Highly Voted 1 year, 10 months ago
Selected Answer: C
optimization is most matured.
upvoted 9 times
...
SHERLOCKAWS
Most Recent 1 month, 1 week ago
Selected Answer: C
Answer is C: Because it reflects a well governed, business-aligned, and mature program where security delivers value efficiently and effectively.
upvoted 1 times
...
Marcelus1714
7 months, 2 weeks ago
Selected Answer: C
keywords here are "Mature" in the question and "Optimized" in the answer
upvoted 1 times
...
oluchecpoint
9 months, 1 week ago
Selected Answer: C
Option C. Similar question in CISM QAE
upvoted 1 times
...
Manix
9 months, 2 weeks ago
Audits check all aspects, decrease of findings is best indiccator
upvoted 1 times
...
POWNED
11 months ago
Selected Answer: C
1. Initial. At the initial level, processes are disorganized, ad hoc and even chaotic. Success likely depends on individual efforts and is not considered to be repeatable. This is because processes are not sufficiently defined and documented to enable them to be replicated. 2. Repeatable. At the repeatable level, requisite processes are established, defined and documented. As a result, basic project management techniques are established, and successes in key process areas are able to be repeated. 3. Defined. At the defined level, an organization develops its own standard software development process. These defined processes enable greater attention to documentation, standardization and integration. 4. Managed. At the managed level, an organization monitors and controls its own processes through data collection and analysis. 5. Optimizing. At the optimizing level, processes are constantly improved through monitoring feedback from processes and introducing innovative processes and functionality.
upvoted 2 times
...
Soleandheel
11 months, 3 weeks ago
C. Security resources are optimized. Optimizing resources demonstrates the maturity of an information security program. Saying that incidents are managed properly is very vague compared to optimizing available resources.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: B
B. Security incidents are managed properly. The best indication of a mature information security program is the effective management of security incidents. This suggests that the organization has implemented proactive measures to prevent incidents, has a well-defined incident response plan in place, and can effectively detect, contain, and mitigate security breaches when they occur.
upvoted 1 times
...
AaronS1990
1 year, 2 months ago
Selected Answer: C
From CISM guide D 100% From CISM Certified Information Security Manager Study Guide, by Mike Chappell. At the top tier of the CMM (capability maturity model), Level 5: Optimizing organizations use a continuous process improvement approach to adjust and fine-tune the way that they work to achieve peak efficiency and effectiveness.
upvoted 2 times
AaronS1990
1 year, 2 months ago
*ffs. C 100%
upvoted 3 times
...
...
[Removed]
1 year, 3 months ago
Selected Answer: C
From the CISM Review Manual, 15th Edition, by ISACA: "An effective security program is one that optimizes the use of security resources. This does not mean simply spending less, but rather making sure that every security dollar is used in the most effective way. This is indicative of a mature information security program because it shows that the program is integrated into the overall business processes of the organization and is not merely a reactive measure to incidents or compliance requirements."
upvoted 3 times
...
richck102
1 year, 4 months ago
C. Security resources are optimized.
upvoted 1 times
...
45
1 year, 4 months ago
Why not C? I would think a security program where resources are optimized does handle incidents properly and more..??
upvoted 1 times
...
wello
1 year, 5 months ago
Selected Answer: D
D. Security audit findings are reduced. This includes the other answers too.
upvoted 3 times
...
Tsubasa1234
1 year, 7 months ago
Selected Answer: B
I think B too
upvoted 1 times
...
Souvik124
1 year, 8 months ago
The BEST indication of a mature information security program is that security incidents are managed properly (Option B)
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago