exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 88 discussion

Actual exam question from Isaca's CISM
Question #: 88
Topic #: 1
[All CISM Questions]

Which of the following is the MOST essential element of an information security program?

  • A. Prioritizing program deliverables based on available resources
  • B. Benchmarking the program with global standards for relevance
  • C. Involving functional managers in program development
  • D. Applying project management practices used by the business
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aokisan
Highly Voted 1 year, 9 months ago
Selected Answer: C
functional managers will develop better program
upvoted 11 times
...
helg420
Most Recent 5 months, 2 weeks ago
Selected Answer: C
C. Involving functional managers in program development. Involving functional managers in program development is a critical element for the success of an information security program. The involvement of functional managers ensures that security considerations are integrated across different business areas, reflecting the unique needs of each part of the organization. This collaboration fosters a culture of security, aligns security objectives with business objectives, and ensures that security controls are applicable and practical. In the ISACA article "Essential Functions of a Cybersecurity Program," they mention how a program-oriented approach to cybersecurity "supports the organization’s vision, goals and objectives." This highlights that without proper stakeholder engagement, alignment with the broader organizational goals might be compromised, potentially making the security program ineffective.
upvoted 1 times
...
oluchecpoint
8 months, 2 weeks ago
Selected Answer: C
C. Involving functional managers in program development.
upvoted 1 times
...
peelu
10 months, 1 week ago
Selected Answer: C
C. Involving functional managers in program development.
upvoted 1 times
...
Cyberbug2021
11 months ago
Selected Answer: C
get people involved
upvoted 1 times
...
Viperhunter
11 months ago
Selected Answer: C
Involving functional managers in program development ensures that the information security program aligns with the organization's overall business objectives and takes into account the specific needs and requirements of different business functions. This collaboration helps in obtaining buy-in from key stakeholders, understanding the business context, and tailoring security measures to fit the organization's unique operational landscape. While prioritizing program deliverables based on available resources (Option A) and benchmarking against global standards (Option B) are important considerations, involving functional managers ensures that the program is closely aligned with the organization's specific operational context. Applying project management practices used by the business (Option D) is beneficial, but it is not as fundamental as involving functional managers in the development of the program.
upvoted 2 times
...
Craftymartha
1 year ago
Selected Answer: C
Section 3.1.2 from the CISM Study Guide lists 3 essential items of the Information Security Program, second one is cooperation and support from management and stakeholders.
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
B. Benchmarking the program with global standards for relevance Benchmarking the information security program with global standards is crucial because it ensures that the program is aligned with recognized best practices and industry standards. This helps establish a strong foundation for the program by ensuring that it addresses essential security principles and is relevant to the organization's needs.
upvoted 2 times
...
DavoA
1 year, 3 months ago
Selected Answer: C
functional managers in this case are the business owners
upvoted 1 times
...
wello
1 year, 4 months ago
Selected Answer: C
most essential is involving functional managers
upvoted 1 times
...
DASH_v
1 year, 4 months ago
Selected Answer: A
As a IS manager, would you like to prioritize first then talk to the functional managers for inputs/alignment or you want to talk to functional managers first then find out, oh, i don't have the needed resources to execute or deliver what were discussed?
upvoted 2 times
...
richck102
1 year, 4 months ago
C. Involving functional managers in program development
upvoted 1 times
...
romero318
1 year, 5 months ago
Whenever it has to do with the overall program of ANYTHING cyber security and making it more efficent it is always up to LEADERSHIP to lead that effort.
upvoted 1 times
...
bambs
1 year, 6 months ago
Selected Answer: A
Prioritizing program deliverables based on available resources ensures that the most critical information security risks are addressed first. It helps to ensure that the information security program aligns with the organization's strategic objectives and is relevant to the organization's risk posture.
upvoted 1 times
Dravidian
1 year, 6 months ago
Incorrect - The question is MOST effective, not the FIRST effective.
upvoted 1 times
...
...
Prospect57
1 year, 9 months ago
Selected Answer: C
C should be the answer. The most important element of an info sec program is to align with the business. Interestingly, @Broesweelies, your description of functional managers to ensure that the program is aligned with the org's overall goals and objectives is my reasoning for choosing C.
upvoted 2 times
...
Broesweelies
1 year, 9 months ago
Selected Answer: A
A. Prioritizing program deliverables based on available resources is the MOST essential element of an information security program. Resources are limited, therefore it is important to prioritize which projects and initiatives to undertake based on the organization's goals, risks, and available resources. This will help ensure that the most critical security needs are addressed first, and that the program is sustainable in the long term. B, C, and D are also important elements of an information security program, but they should be done in conjunction with prioritizing program deliverables. Specifically, Benchmarking the program with global standards for relevance, ensures that the program is relevant and in line with industry best practices; Involving functional managers in program development helps ensure that the program is aligned with the organization's overall goals and objectives; and Applying project management practices used by the business helps ensure that the program is delivered on time and within budget.
upvoted 4 times
...
MSKid
2 years ago
Selected Answer: B
Going with B. CISM AIO 2nd - CH4 does refer to standards that information security programs use throughout the risk management phase as it being the core of an originations security program.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago