exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 609 discussion

Actual exam question from Isaca's CISM
Question #: 609
Topic #: 1
[All CISM Questions]

Information security controls should be designed PRIMARILY based on:

  • A. regulatory requirements.
  • B. a vulnerability assessment.
  • C. business risk scenarios.
  • D. a business impact analysis (BIA).
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
03allen
1 year ago
Selected Answer: C
Controls are provided based on the security risk assessment.
upvoted 3 times
03allen
1 year ago
and you dont need a BIA to define controls.
upvoted 1 times
...
...
Thavee
1 year, 3 months ago
Selected Answer: D
First to under stand BIA, (CISM Prep Guide, Mc Graw Hill) Business Impact Analysis Business impact analysis (BIA) is the study of business processes in an organization to understand their relative criticality, their dependencies upon resources, and how they are affected when interruptions occur. The objective of the BIA is to identify the impact that different business disruption scenarios will have on ongoing business operations. The results of the BIA drive subsequent activities—namely, BCP and DRP. The BIA is one of several steps of critical, detailed analysis that must be carried out before the development of continuity or recovery plans and procedures. The question is "Information security controls should be designed PRIMARILY based on"
upvoted 1 times
Thavee
1 year, 3 months ago
Information Security Control Design and Selection The procedures, mechanisms, systems, and other measures designed to reduce risk through compliance to policies are known as controls. An organization develops controls to ensure that its business objectives will be met, risks will be reduced, and errors will be prevented or corrected. Controls are created to ensure desired outcomes and to avoid unwanted outcomes. They are created for several reasons, including the following: • Regulation A regulation on cybersecurity or privacy may emphasize certain outcomes, some of which may compel an organization to develop controls. • Risk assessment A recent risk assessment or targeted risk analysis may indicate a higher than acceptable risk. The chosen risk treatment may be mitigation in the form of a new control. • Audit result The results of a recent audit may indicate a trouble spot warranting additional attention and care.
upvoted 1 times
...
...
xcjxcj
1 year, 4 months ago
Selected Answer: D
A = Law B = probability C = risk result D = criticalness Controls should be designed based on criticalness C is efficiency, D is effectiveness
upvoted 3 times
...
POWNED
1 year, 5 months ago
Selected Answer: D
I believe the best answer here is D.
upvoted 1 times
...
richck102
2 years ago
C. business risk scenarios.
upvoted 1 times
...
meelaan
2 years, 3 months ago
Selected Answer: D
C is included in D so D
upvoted 2 times
...
CarlLimps
2 years, 4 months ago
Selected Answer: C
I like C as well.
upvoted 2 times
...
Broesweelies
2 years, 5 months ago
Selected Answer: C
Information security controls should be designed primarily based on business risk scenarios because they ensure that an organization's most important assets and processes are protected. A business risk scenario is a hypothetical situation that could potentially cause harm to the organization's assets or operations. By identifying and understanding these scenarios, an organization can prioritize its efforts and resources to mitigate the most significant risks to the business. Additionally, this approach allows the organization to align its security controls with its overall risk management strategy and business objectives.
upvoted 4 times
Thavee
1 year, 3 months ago
ISC follows Security Strategy, and security strategy (approved by security steering commiitee) follows business objectives, always. stakeholders do not care some risks at all if the risk is USD 100,000.00, but the likelyhood is 0.001%.
upvoted 1 times
...
...
aokisan
2 years, 6 months ago
Selected Answer: C
risk management is based on scenario.
upvoted 3 times
...
Manzer
2 years, 6 months ago
Selected Answer: D
A BIA will show you where you should be putting your efforts at.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...