ExamGecko
Question list
Search
Search

Question 116 - CISM discussion

Report
Export

Which of the following methods is the BEST way to demonstrate that an information security program provides appropriate coverage?

A.
Security risk analysis
Answers
A.
Security risk analysis
B.
Gap assessment
Answers
B.
Gap assessment
C.
Maturity assessment
Answers
C.
Maturity assessment
D.
Vulnerability scan report
Answers
D.
Vulnerability scan report
Suggested answer: B

Explanation:

A gap assessment is the best way to demonstrate that an information security program provides appropriate coverage, as it compares the current state of the information security program with the desired state based on the organization's objectives, policies, standards, and regulations. A gap assessment can identify the strengths and weaknesses of the information security program, as well as the areas that need improvement or alignment. A gap assessment can also provide recommendations and action plans to close the gaps and achieve the desired level of information security coverage.

The other options are not as good as a gap assessment, as they do not provide a comprehensive and holistic view of the information security coverage. Security risk analysis is a process to identify and evaluate the risks to the information assets and the impact of potential threats and vulnerabilities. It can help to prioritize and mitigate the risks, but it does not measure the compliance or performance of the information security program. Maturity assessment is a process to measure the level of maturity of the information security program based on a predefined model or framework. It can help to benchmark and improve the information security program, but it does not account for the specific needs and expectations of the organization. Vulnerability scan report is a document that shows the results of a scan on the network or system to identify the existing or potential vulnerabilities. It can help to validate and improve the technical security, but it does not assess the non-technical aspects of information security, such as governance, policies, or awareness.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 211-212, 215-216, 233-234, 237-238.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1015.

CISM domain 3: Information security program development and management [2022 update], Infosec Certifications,2.

asked 01/10/2024
Kaniamuthan K
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first