ExamGecko
Question list
Search
Search

Question 250 - CISM discussion

Report
Export

Which of the following would be MOST effective in gaining senior management approval of security investments in network infrastructure?

A.
Performing penetration tests against the network to demonstrate business vulnerability
Answers
A.
Performing penetration tests against the network to demonstrate business vulnerability
B.
Highlighting competitor performance regarding network best security practices
Answers
B.
Highlighting competitor performance regarding network best security practices
C.
Demonstrating that targeted security controls tie to business objectives
Answers
C.
Demonstrating that targeted security controls tie to business objectives
D.
Presenting comparable security implementation estimates from several vendors
Answers
D.
Presenting comparable security implementation estimates from several vendors
Suggested answer: C

Explanation:

The most effective way to gain senior management approval of security investments in network infrastructure is by demonstrating that targeted security controls tie to business objectives.

Security investments should be tied to business objectives and should support the overall goals of the organization. By demonstrating that the security controls will directly support the organization's business objectives, senior management will be more likely to approve the investment.

According to the Certified Information Security Manager (CISM) Study Manual, 'To gain senior management's approval for investments in security, it is essential to show how the security controls tie to business objectives and are in support of the overall goals of the organization.'

While performing penetration tests against the network, highlighting competitor performance, and presenting comparable security implementation estimates from vendors are all useful in presenting the value of security investments, they are not as effective as demonstrating how the security controls will support the organization's business objectives.

Certified Information Security Manager (CISM) Study Manual, 15th Edition, Page 305.

asked 01/10/2024
Aneez vezhappilly
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first