ExamGecko
Question list
Search
Search

Question 86 - CISM discussion

Report
Export

Which of the following is the BEST way to ensure the organization's security objectives are embedded in business operations?

A.
Publish adopted information security standards.
Answers
A.
Publish adopted information security standards.
B.
Perform annual information security compliance reviews.
Answers
B.
Perform annual information security compliance reviews.
C.
Implement an information security governance framework.
Answers
C.
Implement an information security governance framework.
D.
Define penalties for information security noncompliance.
Answers
D.
Define penalties for information security noncompliance.
Suggested answer: C

Explanation:

The best way to ensure the organization's security objectives are embedded in business operations is to implement an information security governance framework. An information security governance framework is a set of policies, procedures, standards, guidelines, roles, and responsibilities that define and direct how the organization manages and measures its information security activities. An information security governance framework helps to align the information security strategy with the business strategy and the organizational culture, and to ensure that the information security objectives are consistent with the business objectives and the stakeholder expectations. An information security governance framework also helps to establish the authority, accountability, and communication channels for the information security function, and to provide the necessary resources, tools, and controls to implement and monitor the information security program. By implementing an information security governance framework, the organization can embed the information security objectives in business operations, and ensure that the information security function supports and enables the business processes and functions, rather than hinders or restricts them.

Reference= CISM Review Manual, 16th Edition, Chapter 1: Information Security Governance, Section: Information Security Governance Framework, page 181; CISM Review Questions, Answers & Explanations Manual, 10th Edition, Question 75, page 702.

asked 01/10/2024
Toan Tran
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first