ExamGecko
Question list
Search
Search

Question 307 - CISM discussion

Report
Export

To help ensure that an information security training program is MOST effective, its contents should be:

A.
based on recent incidents.
Answers
A.
based on recent incidents.
B.
based on employees' roles.
Answers
B.
based on employees' roles.
C.
aligned to business processes.
Answers
C.
aligned to business processes.
D.
focused on information security policy.
Answers
D.
focused on information security policy.
Suggested answer: B

Explanation:

To help ensure that an information security training program is MOST effective, its contents should be based on employees' roles, as different roles have different information security responsibilities, needs, and risks. A role-based training program can tailor the content and delivery methods to suit the specific learning objectives and outcomes for each role, and enhance the relevance and retention of the information security knowledge and skills. Based on recent incidents is not the best answer, as it may not cover all the information security topics that are important for the organization, and may not address the root causes or preventive measures of the incidents. Based on employees' roles is more comprehensive and proactive than based on recent incidents. Aligned to business processes is not the best answer, as it may not reflect the individual roles and responsibilities of the employees, and may not cover all the information security aspects that are relevant for the organization. Based on employees' roles is more specific and personalized than aligned to business processes. Focused on information security policy is not the best answer, as it may not provide sufficient details or examples to help the employees understand and apply the information security policy in their daily work.Based on employees' roles is more practical and engaging than focused on information security policy.Reference= CISM Review Manual, 16th Edition, page 2241; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 1002

To help ensure that an information security training program is MOST effective, its contents should be based on employees' roles. This is because different roles have different responsibilities and access levels to information and systems, and therefore face different types of threats and risks. By tailoring the training content to the specific needs and expectations of each role, the training program can increase the relevance and retention of the information security knowledge and skills for the employees. Role-based training can also help employees understand their accountability and obligations for protecting information assets in their daily tasks

asked 01/10/2024
Rachana Kesarkar
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first