Management decisions concerning information security investments will be most effective when they are based on option A: a process for identifying and analyzing threats and vulnerabilities.
It is crucial for organizations to have a systematic approach in identifying and analyzing potential threats and vulnerabilities to their information security. This involves conducting risk assessments, vulnerability assessments, and threat intelligence analysis. By understanding the specific risks faced by the organization, management can make informed decisions about where to invest their resources to mitigate those risks effectively.
This involves conducting risk assessments, identifying potential risks, and evaluating the potential impact and likelihood of those risks. Once these threats and vulnerabilities are identified, management can then make informed decisions about how to prioritize and allocate resources for information security investments.
A. a process for identifying and analyzing threats and vulnerabilities
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
yottabyte
7 months agoMarcelus1714
8 months, 4 weeks agoAlexJacobson
9 months, 1 week agoUncle_Lucifer
10 months, 4 weeks agokoala_lay
1 year, 1 month agooluchecpoint
1 year, 1 month agoddharia94
1 year, 3 months agorichck102
1 year, 3 months agoJae_kes
1 year, 4 months ago