ExamGecko
Question list
Search
Search

Question 475 - CISM discussion

Report
Export

Which of the following defines the MOST comprehensive set of security requirements for a newly developed information system?

A.
Risk assessment results
Answers
A.
Risk assessment results
B.
Audit findings
Answers
B.
Audit findings
C.
Key risk indicators (KRIs)
Answers
C.
Key risk indicators (KRIs)
D.
Baseline controls
Answers
D.
Baseline controls
Suggested answer: D

Explanation:

Baseline controls are the minimum set of security requirements that apply to all information systems in an organization, regardless of their specific functions or characteristics. They are derived from the organization's security policies, standards, and best practices, and they reflect the organization's risk appetite and tolerance. Baseline controls provide a consistent and comprehensive foundation for the security of the information systems, and they can be tailored or supplemented by additional controls as needed for specific systems or situations. The other options are not as comprehensive as baseline controls, as they may only address certain aspects or aspects of the security requirements, or they may vary depending on the system or the context. For example, risk assessment results are an important input for defining the security requirements, but they are not the requirements themselves. Audit findings are an output of evaluating the compliance and effectiveness of the security requirements, but they are not the requirements themselves. Key risk indicators (KRIs) are metrics that measure the level of risk exposure and performance of the security requirements, but they are not the requirements themselves.Reference=

CISM Review Manual 15th Edition, page 113: ''Baseline controls are the minimum security requirements that apply to all systems within the organization.''

CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, question 478: ''Baseline controls are the minimum security requirements that apply to all systems within the organization. They are derived from the organization's security policies, standards, and best practices, and they reflect the organization's risk appetite and tolerance.''

asked 01/10/2024
Thuy Nguyen
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first