ExamGecko
Question list
Search
Search

Question 68 - CISM discussion

Report
Export

The effectiveness of an information security governance framework will BEST be enhanced if:

A.
consultants review the information security governance framework.
Answers
A.
consultants review the information security governance framework.
B.
a culture of legal and regulatory compliance is promoted by management.
Answers
B.
a culture of legal and regulatory compliance is promoted by management.
C.
risk management is built into operational and strategic activities.
Answers
C.
risk management is built into operational and strategic activities.
D.
IS auditors are empowered to evaluate governance activities
Answers
D.
IS auditors are empowered to evaluate governance activities
Suggested answer: B

Explanation:

The effectiveness of an information security governance framework will best be enhanced if risk management is built into operational and strategic activities. This is because risk management is a key component of information security governance, which is the process of establishing and maintaining a framework to provide assurance that information security strategies are aligned with and support business objectives, are consistent with applicable laws and regulations, and are effectively managed and measured. Risk management involves identifying, analyzing, evaluating, treating, monitoring, and communicating information security risks that may affect the organization's objectives, assets, and stakeholders. By integrating risk management into operational and strategic activities, the organization can ensure that information security risks are considered and addressed in every decision and action, and that the information security governance framework is aligned with the organization's risk appetite and tolerance. This also helps to optimize the allocation of resources, enhance the performance and value of information security, and improve the accountability and transparency of information security governance.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Information Security Governance Framework, page 181; CISM Review Manual, 16th Edition, Chapter 2: Information Risk Management, Section: Risk Management, page 812; CISM Review Questions, Answers & Explanations Manual, 10th Edition, Question 53, page 493.

asked 01/10/2024
Arturs Grigorjevs
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first