ExamGecko
Question list
Search
Search

Question 297 - CISM discussion

Report
Export

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

A.
Require remote wipe capabilities for devices.
Answers
A.
Require remote wipe capabilities for devices.
B.
Conduct security awareness training.
Answers
B.
Conduct security awareness training.
C.
Review and update existing security policies.
Answers
C.
Review and update existing security policies.
D.
Enforce passwords and data encryption on the devices.
Answers
D.
Enforce passwords and data encryption on the devices.
Suggested answer: C

Explanation:

The primary responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations is to review and update existing security policies. Security policies are the foundation of an organi-zation's security program, as they define the goals, objectives, principles, roles, respon-sibilities, and requirements for protecting information and systems. Security policies should be reviewed and updated regularly to reflect changes in the organization's envi-ronment, needs, risks, and technologies1. Implementing the use of company-owned mobile devices in its operations is a significant change that may introduce new threats and vulnerabilities, as well as new opportunities and benefits, for the organiza-tion. Therefore, the information security manager should review and update existing security policies to address the following aspects2:

* The scope, purpose, and ownership of company-owned mobile devices

* The acceptable and unacceptable use of company-owned mobile devices

* The security standards and best practices for company-owned mobile devices

* The roles and responsibilities of users, managers, IT staff, and vendors regarding compa-ny-owned mobile devices

* The procedures for provisioning, managing, monitoring, and decommissioning company-owned mobile devices

* The incident response and reporting process for company-owned mobile devices

By reviewing and updating existing security policies, the information security manager can ensure that the organization's security program is aligned with its business objec-tives and risk appetite, as well as compliant with applicable laws and regulations. The other options are not the primary responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations. They are possible actions or controls that may be derived from or support-ed by the updated security policies. Requiring remote wipe capabilities for devices is a technical control that can help prevent data loss or theft in case of device loss or com-promise3. Conducting security awareness training is an administrative control that can help educate users about the security risks and responsibilities associated with using company-owned mobile devices. Enforcing passwords and data encryption on the de-vices is a technical control that can help protect data confidentiality and integrity on company-owned mobile devices.

Reference: 1: Information Security Policy - NIST 2: Mobile Device Security Policy - SANS 3: Remote Wipe: What It Is & How It Works - Lifewire : Security Awareness Training - NIST : Mobile Device Encryption - NIST

asked 01/10/2024
matthew kim
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first