ExamGecko
Question list
Search
Search

Question 158 - CISM discussion

Report
Export

Which of the following is MOST helpful for aligning security operations with the IT governance framework?

A.
Security risk assessment
Answers
A.
Security risk assessment
B.
Security operations program
Answers
B.
Security operations program
C.
Information security policy
Answers
C.
Information security policy
D.
Business impact analysis (BIA)
Answers
D.
Business impact analysis (BIA)
Suggested answer: C

Explanation:

An information security policy is the MOST helpful for aligning security operations with the IT governance framework because it defines the security objectives, principles, standards, and guidelines that guide the security operations activities and processes. An information security policy also establishes the roles and responsibilities, authorities and accountabilities, and reporting and communication mechanisms for security operations. An information security policy should be aligned with the IT governance framework, which provides the direction, structure, and oversight for the effective management and delivery of IT services and resources.An information security policy should also be consistent with the enterprise governance framework, which sets the vision, mission, values, and goals of the organization12. A security risk assessment (A) is helpful for identifying and evaluating the security risks that may affect the security operations and the IT governance framework, but it is not the MOST helpful for aligning them.A security risk assessment should be based on the information security policy, which defines the risk appetite, tolerance, and criteria for the organization12. A security operations program (B) is helpful for implementing and executing the security operations activities and processes that support the IT governance framework, but it is not the MOST helpful for aligning them.A security operations program should be derived from the information security policy, which provides the strategic direction and guidance for the security operations12. A business impact analysis (BIA) (D) is helpful for determining the criticality and priority of the business processes and functions that depend on the security operations and the IT governance framework, but it is not the MOST helpful for aligning them.A BIA should be conducted in accordance with the information security policy, which specifies the business continuity and disaster recovery requirements and objectives for the organization12.Reference=1: CISM Review Manual 15th Edition, page 75-76, 81-82, 88-89, 93-941;2: CISM Domain 1: Information Security Governance (ISG) [2022 update]2

asked 01/10/2024
Gabriel Ty
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first