exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 267 discussion

Actual exam question from Isaca's CISM
Question #: 267
Topic #: 1
[All CISM Questions]

An IT department plans to migrate an application to the public cloud. Which of the following is the information security manager's MOST important action in support of this initiative?

  • A. Review cloud provider independent assessment reports.
  • B. Provide cloud security requirements
  • C. Evaluate service level agreements (SLAs)
  • D. Calculate security implementation costs
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Adabach
1 day, 20 hours ago
Selected Answer: C
C for me. I think the most important action is to evaluate the SLA
upvoted 1 times
...
Shackman66
1 week, 3 days ago
Selected Answer: C
SLAs come first
upvoted 1 times
...
oluchecpoint
8 months, 1 week ago
Selected Answer: B
B. Provide cloud security requirements The most important action for the information security manager in support of migrating an application to the public cloud is to provide cloud security requirements. This is essential because it sets the foundation for ensuring that security measures are integrated into the cloud migration process. By clearly defining security requirements, the IT department can work with the cloud provider to ensure that the application is deployed securely in the cloud environment.
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
B. Provide cloud security requirements The most important action for the information security manager in support of migrating an application to the public cloud is to provide cloud security requirements. This is essential because it sets the foundation for ensuring that security measures are integrated into the cloud migration process. By clearly defining security requirements, the IT department can work with the cloud provider to ensure that the application is deployed securely in the cloud environment.
upvoted 1 times
...
Hugo1717
1 year, 1 month ago
Selected Answer: B
The correct answer is B. Provide cloud security requirements. Explanation: Among the options provided, providing cloud security requirements is the most important action for the information security manager in support of migrating an application to the public cloud.
upvoted 1 times
...
wello
1 year, 3 months ago
Selected Answer: B
While reviewing cloud provider independent assessment reports is an important step in the cloud migration process, it is not the information security manager's most important action in this scenario. Assessing the cloud provider's security capabilities: Reviewing independent assessment reports can provide valuable insights into the security controls and practices of the cloud provider. It allows the information security manager to evaluate the provider's adherence to industry standards, certifications, and best practices. However, this action alone does not address the specific security requirements and concerns of the organization's application and data.
upvoted 2 times
...
richck102
1 year, 4 months ago
C. Evaluate service level agreements (SLAs)
upvoted 3 times
e891cd1
5 months, 3 weeks ago
You would need to compare the SLA to your requirements.
upvoted 1 times
...
...
Abhey
1 year, 5 months ago
Selected Answer: B
Providing cloud security requirements will ensure that security considerations are taken into account in the cloud migration process. It will help to identify and mitigate risks and ensure that adequate security controls are implemented to protect the organization's data and assets in the cloud environment.
upvoted 2 times
...
Broesweelies
1 year, 8 months ago
Selected Answer: B
B. Provide cloud security requirements The information security manager's most important action in support of this initiative is to provide cloud security requirements. This includes identifying and documenting the specific security controls, policies and procedures that are required to protect the organization's data and systems in the cloud environment. It also includes ensuring that the cloud provider's security capabilities meet these requirements. By providing clear and comprehensive security requirements, the information security manager can help ensure that the application migration is secure and compliant with relevant regulations and standards.
upvoted 3 times
...
baranikumar_v
1 year, 9 months ago
A. Review cloud provider's security The key to the question is "plan". SLA will come into the picture only when you establish NDA/contract/SLA after finalising one of the multiple identified cloud providers. You will end up providing the cloud security requirements only to the finalised vendor.
upvoted 4 times
...
aokisan
1 year, 9 months ago
Selected Answer: C
evaluate SLAs.
upvoted 2 times
...
ukwummere1
1 year, 10 months ago
Selected Answer: B
I'll go with B
upvoted 2 times
...
toffboi
1 year, 10 months ago
Selected Answer: C
I believe it should be C.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago