Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 436 discussion

Actual exam question from Isaca's CISM
Question #: 436
Topic #: 1
[All CISM Questions]

Which of the following is the MOST important requirement for a successful security program?

  • A. Management decision on asset value
  • B. Penetration testing on key systems
  • C. Nondisclosure agreements (NDA) with employees
  • D. Mapping security processes to baseline security standards
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Jae_kes
Highly Voted 1 year, 5 months ago
Selected Answer: A
Without management approval, option D will not be possible.
upvoted 6 times
...
david124
Most Recent 3 weeks, 4 days ago
Selected Answer: D
D for sure
upvoted 1 times
...
Manix
9 months, 3 weeks ago
Selected Answer: D
CRM 16, page 141: Primary program activities include design, development and implementation of controlsrelated to inf.security
upvoted 2 times
...
AlexJacobson
9 months, 3 weeks ago
Selected Answer: A
I'd say it's A, because before you implement information security program in any shape or form, you need to have clear understanding of what you're trying to protect. How would you perform a risk assessment and prioritize risks or implement cost-effective controls if management didn't tell you the value of the assets you have to protect?
upvoted 3 times
...
POWNED
10 months, 3 weeks ago
Selected Answer: D
If A simply said management approval I would go with it, but since it specifically mentions asset value I am going to have to pick D as the best answer here.
upvoted 2 times
...
jcisco123
10 months, 3 weeks ago
Selected Answer: D
While management's decision on asset value (A) is important for risk management and prioritization, it does not, by itself, ensure the success of a security program. The program's effectiveness relies more on how security processes are implemented and managed, which is why mapping these processes to baseline standards is critical.
upvoted 1 times
...
Soleandheel
12 months ago
D. Mapping security processes to baseline security standards makes more sense
upvoted 3 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: A
A. Management decision on asset value This is because understanding the value of your assets (data, systems, infrastructure, etc.) helps in prioritizing security efforts and allocating resources effectively. Without a clear understanding of the asset's value, it's challenging to make informed decisions about where to invest in security measures, which security controls to implement, and how much to budget for security initiatives.
upvoted 2 times
...
Agamennore
1 year, 2 months ago
Selected Answer: A
Without management approval, option D will not be possibl
upvoted 2 times
...
[Removed]
1 year, 3 months ago
Selected Answer: D
The CISM (Certified Information Security Manager) Review Manual, 27th Edition, supports this viewpoint by stating: "A successful security program requires a systematic and structured approach to managing security risks. This begins with establishing baseline security standards and then mapping the organization's security processes to these standards. This helps ensure that all security activities are aligned with recognized best practices and the organization's risk management objectives."
upvoted 2 times
Goseu
1 year, 3 months ago
There is no such thing as 27th version , please stop posting chatgpt answers.
upvoted 5 times
SpaceMonkey1
10 months, 2 weeks ago
what is this then? https://www.amazon.com/CISA-Review-Manual-27th-Isaca/dp/1604207671
upvoted 1 times
AlexJacobson
9 months, 3 weeks ago
This is a book for CISA, not CISM cert.
upvoted 1 times
...
...
...
...
richck102
1 year, 4 months ago
A. Management decision on asset value
upvoted 3 times
...
mad68
1 year, 6 months ago
Selected Answer: D
From the ISACA perspective for the CISM examination, the MOST important requirement for a successful security program is: D. Mapping security processes to baseline security standards Mapping security processes to baseline security standards ensures that the organization's security program aligns with established best practices and industry standards. It helps in identifying the necessary security controls, procedures, and guidelines that need to be implemented to protect the organization's assets and mitigate risks effectively.
upvoted 2 times
Az900500
1 year, 4 months ago
Do give us reference e.g link or author and book title .. Just saying from ISACA perspective of CISM sounds enticingly confusing.. Thanks
upvoted 2 times
[Removed]
1 year, 4 months ago
it's a chatgpt answer
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...