Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 160 discussion

Actual exam question from Isaca's CISM
Question #: 160
Topic #: 1
[All CISM Questions]

Which of the following is an information security manager's BEST course of action upon discovering an organization with budget constraints lacks several important security capabilities?

  • A. Suggest the deployment of open-source security tools to mitigate identified risks.
  • B. Establish a business case to demonstrate return on investment (ROI) of a security tool.
  • C. Recommend that the organization avoid the most severe risks.
  • D. Review the most recent audit report and request funding to address the most serious finding.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ATT5832
1 month, 1 week ago
Selected Answer: A
A. If there is a budget constraint and the organization lacks SEVERAL security capabilities, then the BEST solution is to find a cost effective method to provide those capabilities.
upvoted 1 times
...
yottabyte
7 months, 3 weeks ago
Selected Answer: B
Business Case seems to be a better option.
upvoted 1 times
...
AlexJacobson
10 months ago
Selected Answer: D
It's D. When having budget constraints you deal with the most critical stuff first, and then see what budget remains for the rest. And where do you get most objective information on what is the most critical? In an audit report.
upvoted 3 times
Salilgen
9 months ago
I agree. B talks about a security software. What should it be? To find out you have to do D
upvoted 1 times
...
...
oluchecpoint
1 year, 2 months ago
B. when an organization has budget constraints and lacks critical security capabilities, the information security manager should focus on creating a compelling business case that demonstrates the tangible benefits and return on investment of the needed security tool or capability. This approach is more likely to secure the necessary funding and support from the organization's leadership.
upvoted 3 times
...
Goseu
1 year, 3 months ago
Selected Answer: B
I prefer B .
upvoted 1 times
...
jennarink13
1 year, 4 months ago
Going with B. A needs to have a business case too, sooo
upvoted 1 times
...
45
1 year, 5 months ago
Selected Answer: A
If there is a budget constraint then establishing a case for an ROI is just wasting managements time. The best solution would be to implement open source security tools and then if risks are still severe to the organization then possibly establish a business case for tools. Management would appreciate this effort way more. Therefore I’m going with A.
upvoted 2 times
[Removed]
1 year, 4 months ago
It's not a waste of time. You do your job first, present a business case. Then controls can be open source, but first you have to present the case
upvoted 2 times
...
...
Jae_kes
1 year, 5 months ago
Selected Answer: B
B. Establish a business case to demonstrate return on investment (ROI) of a security tool. Explanation: When an organization with budget constraints lacks several important security capabilities, the best course of action for an information security manager is to establish a business case to demonstrate the return on investment (ROI) of a security tool.
upvoted 3 times
...
richck102
1 year, 5 months ago
i vote B. Establish a business case to demonstrate return on investment (ROI) of a security tool.
upvoted 1 times
...
sedardna
1 year, 5 months ago
lA RESPUESTA ES B pero todos iríamos a A
upvoted 1 times
...
Gr3yGh0sT
1 year, 6 months ago
Selected Answer: A
Going with A - as all the other solutions just address one single tool. The best course of action for an information security manager upon discovering an organization with budget constraints lacks several important security capabilities is to suggest the deployment of open-source security tools to mitigate identified risks. Open-source security tools are often free or low-cost, and they can be a valuable way to improve an organization's security posture without breaking the bank.
upvoted 1 times
aws_newbie
9 months ago
if the question asked for FIRST course of action, I'd go with B but the question asked for BEST course of action so I agree with A
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...