exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 349 discussion

Actual exam question from Isaca's CISM
Question #: 349
Topic #: 1
[All CISM Questions]

Which of the following is the MOST effective approach to ensure IT processes are performed in compliance with the information security policies?

  • A. Ensuring that key controls are embedded in the processes
  • B. Providing information security policy training to the process owners
  • C. Allocating sufficient resources
  • D. Identifying risks in the processes and managing those risks
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CarlLimps
Highly Voted 1 year, 3 months ago
Selected Answer: D
I like A, but D is better - D. Identifying risks in the processes and managing those risks. So you will do a risk assessment on the process and manage the identified risks using controls, much better than A.
upvoted 7 times
...
Josef4CISM
Most Recent 3 days, 13 hours ago
Selected Answer: A
While all of the options contribute to ensuring compliance with information security policies, the most effective approach is: A. Ensuring that key controls are embedded in the processes By embedding key controls directly into IT processes, organizations can: Automate compliance: Many controls can be automated, reducing the risk of human error. Proactive enforcement: Controls can be designed to prevent non-compliant actions, rather than just detecting them after the fact. Continuous monitoring: Embedded controls can be monitored continuously to identify and address potential issues early on. While training, resource allocation, and risk management are important, they are more focused on preventing and mitigating risks rather than enforcing compliance directly. Embedding controls within the processes themselves provides a more proactive and effective approach to ensuring compliance.
upvoted 1 times
...
AlexJacobson
5 months, 1 week ago
Selected Answer: A
Both A and D make sense. However, it asks for the most EFFECTIVE approach, which to me means more concrete measures. If you integrate controls in the process, you basically achieved assurance that it will all be done in compliance. D also sounds good, but it's more broad and too vague.
upvoted 2 times
...
blehbleh
5 months, 4 weeks ago
Selected Answer: A
This is A. If you are trying to "ensure IT processes are performed in compliance" then if you embed the key controls in the process you have successful ensure compliance, it can not be deviated from. Therefore, answer A "Ensuring that key controls are embedded in the processes" is correct.
upvoted 2 times
...
Uncle_Lucifer
6 months, 3 weeks ago
Selected Answer: D
Its a VS D, but D makes more viable sense.
upvoted 1 times
...
Silvias4
7 months, 2 weeks ago
Selected Answer: D
Should be D
upvoted 1 times
...
oluchecpoint
10 months ago
A. Ensuring that key controls are embedded in the processes Embedding key controls directly into IT processes is a proactive and preventative approach to ensure compliance with information security policies. This means that security measures and requirements are integrated into the processes themselves, making it difficult for the processes to deviate from the established policies. By doing this, you reduce the likelihood of non-compliance and security breaches. While the other options (providing policy training, allocating resources, and identifying risks) are important, they are complementary measures and may not be as effective as embedding controls within the processes themselves.
upvoted 2 times
...
Hugo1717
10 months, 2 weeks ago
Selected Answer: A
The correct answer is A. Ensuring that key controls are embedded in the processes. Explanation: The most effective approach to ensure IT processes are performed in compliance with information security policies is to ensure that key controls are embedded in the processes. Here's why this option is the most effective: A. Ensuring that key controls are embedded in the processes: Embedding key controls directly into the IT processes ensures that security measures are integrated into the workflows. These controls align the processes with information security policies and guidelines, making adherence to security requirements a natural part of performing the processes.
upvoted 2 times
...
Goseu
11 months, 2 weeks ago
Selected Answer: A
I like A
upvoted 1 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: A
Only A ensures compliance. D is just risk management
upvoted 4 times
Salilgen
4 months, 1 week ago
compliance is just another risk....
upvoted 1 times
...
...
richck102
1 year ago
i vote A
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago