Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 19 discussion

Actual exam question from Isaca's CISM
Question #: 19
Topic #: 1
[All CISM Questions]

When evaluating vendors for sensitive data processing, which of the following should be the FIRST step to ensure the correct level of information security is provided?

  • A. Develop metrics for vendor performance.
  • B. Include information security criteria as part of vendor selection.
  • C. Review third-party reports of potential vendors.
  • D. Include information security clauses in the vendor contract.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
AlexJacobson
1 month, 3 weeks ago
Selected Answer: B
I would also say B and then C. First you develop criteria that you include in vendor selection, then you go about reading third-party reports and compare what's in the report against the criteria.
upvoted 1 times
...
Viperhunter
1 month, 3 weeks ago
Selected Answer: B
Including information security criteria as part of the vendor selection process ensures that security considerations are integrated into the initial evaluation. This step involves assessing the security posture of potential vendors against predefined criteria before proceeding with further evaluation or contractual agreements. It helps filter out vendors that do not meet the required information security standards from the outset. While the other options (developing metrics for vendor performance, reviewing third-party reports, and including information security clauses in the vendor contract) are important steps in the overall vendor management process, incorporating information security criteria early in the vendor selection process is critical for establishing a foundation of security in the relationship from the beginning.
upvoted 1 times
...
greeklover84
2 months ago
Selected Answer: B
agree B.
upvoted 1 times
...
just2pass
8 months, 3 weeks ago
Once an organization has established its third-party risk classification and has begun to identify its third parties and their respective risk tiering, third parties can be assessed. Before assessments can be performed, however, the organization needs to develop a scheme. -AIO Book
upvoted 1 times
...
MrSecNetTech
1 year, 1 month ago
choices A,B,D they are right steps. however they come after the easiest step which is C. no organization in reality will develop performance metrics before checking available public recent third-party audit reports. the sequence is important. C is first and other remaining will be after.
upvoted 1 times
...
MrSecNetTech
1 year, 1 month ago
The first step is getting available info in public like third-party reviews. Before proceeding in other steps that may be still important. but as order, the first step is getting third-party vendor report like gartner report for example. right answer is C.
upvoted 1 times
...
Yemmz
1 year, 4 months ago
A is the best answer, option B is a component of A.
upvoted 1 times
Azurefox79
1 year, 3 months ago
I would disagree, for ex. ensuring systems data is encrypted at rest and in transit is a critical security criteria and is not a metric, nor does it feed into metrics.
upvoted 1 times
...
...
richck102
1 year, 6 months ago
B. Include information security criteria as part of vendor selection.
upvoted 3 times
...
Tsubasa1234
1 year, 7 months ago
Selected Answer: C
The correct answer is C. Reviewing third-party reports of potential vendors is the first step to ensure the correct level of information security is provided. These reports may include results of security audits or assessments, which can provide valuable information on a vendor's security controls and risks. This information can be used to evaluate the vendor's security posture and make an informed decision about whether to engage with them. The other options are also important steps in the process, but they come after reviewing the reports of potential vendors.
upvoted 2 times
...
d3vnu77
1 year, 9 months ago
In order to use B you must have A. A is first.
upvoted 1 times
...
Antonivs
1 year, 10 months ago
B, D maybe for a later phase
upvoted 1 times
...
D2D2
1 year, 11 months ago
Selected Answer: B
Agreed B as well
upvoted 3 times
...
EZPASS
2 years ago
Selected Answer: B
I would say B also.
upvoted 2 times
...
Boats
2 years, 1 month ago
I would agree with B. I have seen many RFPs that included client data protection needs. You want to be upfront with your needs and exclude vendors that don't meet your needs prior to going into a contract.
upvoted 2 times
...
Tay87543
2 years, 1 month ago
A because you are in the evaluation mode
upvoted 1 times
...
aaaa234
2 years, 1 month ago
Selected Answer: D
should be D
upvoted 1 times
mfourati
1 year, 11 months ago
D is necessary but not the FIRST step, B is first then D once the vendor was selected
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...