ExamGecko
Question list
Search
Search

Question 25 - CISM discussion

Report
Export

Which of the following should be the MOST important consideration when establishing information security policies for an organization?

A.
Job descriptions include requirements to read security policies.
Answers
A.
Job descriptions include requirements to read security policies.
B.
The policies are updated annually.
Answers
B.
The policies are updated annually.
C.
Senior management supports the policies.
Answers
C.
Senior management supports the policies.
D.
The policies are aligned to industry best practices.
Answers
D.
The policies are aligned to industry best practices.
Suggested answer: C

Explanation:

The most important consideration when establishing information security policies for an organization is to ensure that senior management supports the policies. Senior management support is essential for the successful implementation and enforcement of information security policies, as it demonstrates the commitment and accountability of the organization's leadership to information security. Senior management support also helps to allocate adequate resources, establish clear roles and responsibilities, and promote a security-aware culture within the organization. Without senior management support, information security policies may not be aligned with the organization's goals and objectives, may not be communicated and disseminated effectively, and may not be followed or enforced consistently.

Job descriptions that include requirements to read security policies are a way of ensuring that employees are aware of their security obligations, but they are not the most important consideration when establishing information security policies. The policies should be relevant and applicable to the employees' roles and functions, and should be reinforced by regular training and awareness programs.

The policies should be updated periodically to reflect the changes in the organization's environment, risks, and requirements, but updating them annually may not be sufficient or necessary. The frequency of updating the policies should depend on the nature and impact of the changes, and should be determined by a defined policy review process.

The policies should be aligned with industry best practices, standards, and frameworks, but this is not the most important consideration when establishing information security policies. The policies should also be customized and tailored to the organization's specific context, needs, and expectations, and should be consistent with the organization's vision, mission, and values.Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, pages 37-38.

ISACA, CISM Review Questions, Answers & Explanations Database, 12th Edition, 2020, question ID 1009.

asked 01/10/2024
Ghalem benhameurlaine
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first