exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 218 discussion

Actual exam question from Isaca's CISM
Question #: 218
Topic #: 1
[All CISM Questions]

Which of the following is MOST important to the successful implementation of an information security program?

  • A. Key performance indicators (KPIs) are defined.
  • B. Adequate security resources are allocated to the program.
  • C. A balanced scorecard is approved by the steering committee.
  • D. The program is developed using global security standards.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 2 years, 4 months ago
Selected Answer: B
The most important factor for the successful implementation of an information security program is the allocation of adequate security resources. This includes not just funding, but also personnel, time, and other resources that are needed to develop, implement and maintain the program. Without adequate resources, the program may be underfunded, understaffed, or otherwise unable to meet its objectives. An information security program is a continuous process and it requires adequate resources to be successful.
upvoted 5 times
...
usercism007
Most Recent 10 months, 2 weeks ago
Selected Answer: B The question clearly states the "Implementation" of information security. From the given options, the only option most suitable is B. without resources, you can't implement the information security program.
upvoted 1 times
...
oluchecpoint
1 year, 4 months ago
Selected Answer: B
B. Adequate security resources are allocated to the program. Key performance indicators (KPIs) are essential for measuring the program's effectiveness, but they depend on having the necessary resources in place to execute the program effectively.
upvoted 1 times
...
Disucssion
1 year, 4 months ago
I selected C as a balanced score card would define how finance, people and technology can be optimized and therefore a measurement of successful implementation.
upvoted 2 times
...
killainc
1 year, 5 months ago
Key performance indicators (KPIs) are an effective way to measure the success of any program (including cybersecurity) and aid in decision-making.
upvoted 1 times
...
DonnyX
1 year, 8 months ago
Selected Answer: A
why not A? without a KPI metrics is defined. how to estimate "adequate resource"??
upvoted 1 times
...
DonnyX
1 year, 8 months ago
why not A? without a KPI metrics is defined. how to estimate "adequate resource"??
upvoted 1 times
...
CISSPST
1 year, 8 months ago
On ground, yes, B, totally. Though as per ISACA Review Guide 16th Ed (3.1.2, page 142): Three elements are essential to ensure successful security program design, implementation and ongoing management: 1. The program must demonstrate execution of a welldeveloped information security strategy that is closely aligned with and supports organizational objectives. 2. The program must be well-designed with cooperation and support from management and stakeholders. 3. Effective metrics must be developed for program design and implementation phases and the subsequent ongoing security program management phases to provide the feedback necessary to guide program execution to achieve the defined outcomes. ISACA says A
upvoted 3 times
AlexJacobson
1 year, 4 months ago
Yes, but KPI is just one metric. What about KGI and KRI, which are arguably more important than KPI when implementing infosec program? So I think adequate resources are the most important of the bunch.
upvoted 1 times
...
...
oluchecpoint
1 year, 8 months ago
B. Adequate security resources are allocated to the program. Key performance indicators (KPIs) are essential for measuring the program's effectiveness, but they depend on having the necessary resources in place to execute the program effectively.
upvoted 2 times
...
richck102
1 year, 11 months ago
B. Adequate security resources are allocated to the program.
upvoted 1 times
...
mad68
2 years ago
Selected Answer: B
B. Adequate security resources are allocated to the program. While all the options listed are important for the successful implementation of an information security program, the allocation of adequate security resources is considered the most crucial factor. Without sufficient resources, including personnel, budget, technology, and tools, it becomes challenging to effectively plan, execute, and sustain the information security program.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...