exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 913 discussion

Actual exam question from Isaca's CISM
Question #: 913
Topic #: 1
[All CISM Questions]

Which of the following should be done FIRST when implementing a security program?

  • A. Implement data encryption.
  • B. Perform a risk analysis.
  • C. Create an information asset inventory.
  • D. Determine the value of information assets.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CISSPST
Highly Voted 4 months ago
It is not possible to analyze the risk to an asset without first identifying it. Risk Management Process: 1. Establishing risk context 2. Risk identification (i) Asset identification (ii) Asset valuation and classification (iii) Threat identification and evaluation (iv) Vulnerability assessment 3. Risk Analysis: likelihood x impact 4. Risk Evaluation: evaluate determined risk against risk acceptance criteria 5. Risk Response: Accept, Transfer, Avoid, Mitigate. As part of mitigation, we select the control. The order would be: C, D, B, A
upvoted 6 times
...
Soleandheel
Most Recent 1 month, 2 weeks ago
C. Create an information asset inventory. Creating an information asset inventory (which includes asset identification and classification) is typically the first step in the risk identification phase. Risk analysis only happens after assets have been identified. So the correct answer cannot be B.
upvoted 2 times
...
richck102
3 months, 1 week ago
Selected Answer: C
C. Create an information asset inventory.
upvoted 2 times
...
Akam
3 months, 4 weeks ago
Selected Answer: B
I do agree it should be Risk Analysis. Yes, traditional way was to identify assets first which was called asset-oriented approach, but in today's world you can start with identifying the threats which is called threat-oriented approach, or start with identifying vulnerabilities which is called vulnerability-oriented approach, and all the three approaches are part of risk analysis.
upvoted 2 times
...
oluchecpoint
4 months ago
Selected Answer: B
B. Perform a risk analysis. A risk analysis involves identifying potential security risks and vulnerabilities, assessing their potential impact on your organization, and determining the likelihood of these risks occurring. This analysis provides you with a clear understanding of your security landscape, helping you make informed decisions about which security measures to implement. Creating an information asset inventory (option C) and determining the value of information assets (option D) are important steps in the security program but typically come after performing a risk analysis. Implementing data encryption (option A) is a specific security control that you may decide to implement as part of your security program, but it should also be based on the findings from the risk analysis to ensure you are addressing the most critical security needs first.
upvoted 1 times
AaronS1990
4 months ago
Another useless ChatGPT answer that no one asked for
upvoted 2 times
...
...
Your_Trusted_Partner
4 months, 3 weeks ago
Selected Answer: C
Create asset inventory
upvoted 2 times
...
Aleksandra1987
5 months ago
I would stay with B
upvoted 1 times
...
drewl25
5 months ago
Selected Answer: C
When implementing a security program, creating an information asset inventory (option C) should be done FIRST. An information asset inventory identifies and documents all the organization's valuable assets, including data, systems, applications, and other resources. This forms the foundation for understanding what needs protection and helps guide subsequent security efforts.
upvoted 2 times
...
Ewunia
5 months ago
Selected Answer: C
For me also C
upvoted 3 times
...
AaronS1990
5 months, 1 week ago
Surely this is C
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago