exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 80 discussion

Actual exam question from Isaca's CISM
Question #: 80
Topic #: 1
[All CISM Questions]

Which of the following BEST validates that security controls are implemented in a new business process?

  • A. Verify the use of a recognized control framework
  • B. Review the process for conformance with information security best practices
  • C. Benchmark the process against industry practices
  • D. Assess the process according to information security policy
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Cytrail
Highly Voted 1 year, 2 months ago
Selected Answer: D
Pure D
upvoted 10 times
...
CertShooter
Highly Voted 1 year, 2 months ago
Must be D.
upvoted 6 times
...
Vishalgupta26
Most Recent 3 weeks, 1 day ago
Selected Answer: D
This is the most effective approach because it directly ties the implementation of security controls to the organization's established security policy. By assessing the process against the defined security policy, the organization ensures that the controls are aligned with its security requirements, regulatory obligations, and overall security objectives.
upvoted 1 times
...
peelu
3 weeks, 5 days ago
Selected Answer: D
Assessing the process against the organization's information security policy ensures that security controls are aligned with the organization's specific requirements and standards.
upvoted 1 times
...
Viperhunter
1 month, 2 weeks ago
Selected Answer: D
Assessing the process against the organization's information security policy ensures that security controls are aligned with the organization's specific requirements and standards. It provides a direct evaluation of whether the implemented controls meet the organization's expectations for safeguarding information. While using a recognized control framework (Option A) and reviewing the process for conformance with information security best practices (Option B) are important, directly assessing the process against the organization's information security policy is a more specific and targeted approach. Benchmarking the process against industry practices (Option C) may provide valuable insights, but it does not necessarily ensure alignment with the organization's specific security policy and requirements.
upvoted 2 times
...
Learner76
1 month, 2 weeks ago
Does paid "Contributor Access" explain why it is A?
upvoted 1 times
...
oluchecpoint
4 months ago
D. Assess the process according to information security policy The best way to validate that security controls are implemented in a new business process is to assess the process according to the organization's information security policy. This approach ensures that the security controls are aligned with the specific security requirements and standards established by the organization itself.
upvoted 2 times
...
todush
5 months ago
Certainly not A. A "recognized control framework" doesn't meant that it fits the objectives of the organization. The information security policy does, so response D is the only correct response.
upvoted 1 times
...
rugerfan17
7 months ago
Selected Answer: D
D. Does the process align to the security policy
upvoted 2 times
...
Monkey2173
7 months, 1 week ago
Selected Answer: A
When the company already aligns to a control framework, verifying that business processes are using it ensures they would focus effort in the right direction
upvoted 1 times
...
richck102
7 months, 3 weeks ago
D. Assess the process according to information security policy
upvoted 2 times
...
dedfef
9 months, 1 week ago
Selected Answer: D
I like D
upvoted 1 times
...
jaiz
10 months, 1 week ago
Selected Answer: D
To validate basically we need to perform an assessment
upvoted 1 times
...
Antonivs
11 months, 2 weeks ago
Selected Answer: D
D for sure!
upvoted 3 times
...
Prospect57
11 months, 3 weeks ago
Selected Answer: D
D looks like the best answer here.
upvoted 3 times
...
Broesweelies
11 months, 3 weeks ago
Selected Answer: D
D. Assess the process according to information security policy would BEST validate that security controls are implemented in a new business process. By assessing the process against the organization's own information security policy, it ensures that the controls implemented align with the organization's overall security stance and meet their specific requirements.
upvoted 6 times
...
MyKasala
1 year ago
Selected Answer: D
Answer D
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago