exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 244 discussion

Actual exam question from Isaca's CISM
Question #: 244
Topic #: 1
[All CISM Questions]

Which of the following is MOST important to ensure when considering exceptions to an information security policy?

  • A. Exceptions are approved by executive management.
  • B. Exceptions undergo regular review.
  • C. Exceptions reflect the organizational risk appetite.
  • D. Exceptions are based on data classification.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
roman_cat
9 months ago
If the exception is to be approved by senior management, clearly it does NOT fall under the organization's risk appetite. I answer A
upvoted 2 times
...
oluchecpoint
11 months, 2 weeks ago
Selected Answer: C
C. Exceptions reflect the organizational risk appetite. While all of the options are important in the context of information security, ensuring that exceptions align with the organization's risk appetite is crucial. This means that exceptions should be evaluated and granted or denied in a way that takes into account the organization's tolerance for risk. If an exception introduces too much risk or deviates significantly from the established risk tolerance, it could jeopardize the overall security of the organization. Therefore, aligning exceptions with the organization's risk appetite is a fundamental consideration in the exception management process.
upvoted 4 times
...
AlexJacobson
11 months, 4 weeks ago
Selected Answer: A
If C said "tolerance" instead of "appetite", then I would've considered C as a correct answer. As it is, A seems the most correct to me.
upvoted 2 times
...
Learner76
1 year, 1 month ago
Selected Answer: A
It has to be approved by executive else it doesn't matter if it is or not within the risk appetite
upvoted 1 times
...
wickhaarry
1 year, 3 months ago
An exception can exceed organization risk apetite but within risk tolerance levels and accepted by management
upvoted 2 times
...
oluchecpoint
1 year, 4 months ago
C. Exceptions reflect the organizational risk appetite. While all of the options are important in the context of information security, ensuring that exceptions align with the organization's risk appetite is crucial. This means that exceptions should be evaluated and granted or denied in a way that takes into account the organization's tolerance for risk. If an exception introduces too much risk or deviates significantly from the established risk tolerance, it could jeopardize the overall security of the organization. Therefore, aligning exceptions with the organization's risk appetite is a fundamental consideration in the exception management process.
upvoted 1 times
AlexJacobson
11 months, 4 weeks ago
Just keep listening to ChatGPT, you guaranteed to fail the exam...
upvoted 2 times
...
...
Agamennore
1 year, 4 months ago
Selected Answer: A
Such trade￾offs should be considered in the policy development process, when possible, to minimize the need for subsequent exceptions. As part of the program development, a formal waiver process should be implemented to manage the life cycle of these exceptions to ensure they are periodically reviewed and, when possible, closed. Any such policy exceptions must be assessed for risk and impact prior to implementation and the identified risk accepted by appropriate levels of management.
upvoted 2 times
...
wello
1 year, 7 months ago
Selected Answer: C
Risk Appetite
upvoted 1 times
...
richck102
1 year, 7 months ago
C. Exceptions reflect the organizational risk appetite.
upvoted 1 times
...
Broesweelies
1 year, 12 months ago
Selected Answer: C
The most important thing to ensure when considering exceptions to an information security policy is that exceptions reflect the organizational risk appetite. This means that the organization's risk management strategy and risk appetite should be taken into account when determining whether to grant an exception to the security policy. An organization's risk appetite is its tolerance for risk and the level of risk that it is willing to accept in order to achieve its business objectives. Exceptions to the security policy should not exceed the organization's risk appetite, and should be carefully evaluated to ensure that they do not create unacceptable risks.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...