exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 383 discussion

Actual exam question from Isaca's CISM
Question #: 383
Topic #: 1
[All CISM Questions]

Which of the following is the MOST important consideration when defining security configuration baselines?

  • A. The baselines address applicable regulatory standards.
  • B. The baselines are proportionate to risk.
  • C. The baselines address known system vulnerabilities.
  • D. The baselines align with lines of business.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 7 months ago
Selected Answer: B
While regulatory compliance is important, it's not necessarily the most important consideration when defining security configuration baselines. Compliance with regulations can help reduce risk, but baselines should first and foremost be proportionate to the risks the organization faces. This means that the baselines should be tailored to the specific risks and threats that the organization is most likely to encounter, rather than simply aiming to meet a minimum standard set by a regulation. Compliance with regulations is important, but it should not be the only or primary consideration when defining security configuration baselines.
upvoted 8 times
...
Josef4CISM
Most Recent 1 month, 3 weeks ago
Selected Answer: B
Its B, because of the word "proportionate". This means that the baseline configuration is well balanced between potential operational restrictions (e.g., blocking USB usage) and security benefits. Essentially proportionate risk can include the considerations of all other answer options A,C and D.
upvoted 1 times
...
ssdny
5 months, 1 week ago
Selected Answer: A
This is a "configuration" question. Therefore, select A
upvoted 1 times
...
AlexJacobson
7 months, 1 week ago
Selected Answer: A
This is actually a tricky one. For example, if the industry regulation demands that you protect confidentiality of data with encryption that has at least 2048-bit long encryption keys, then your security baselines have to reflect that with stating what encryption algorithms must be used at minimum. Otherwise you're breaking the regulatory requirements. Therefore, A would be a correct answer. On the other hand, if the risk of non-compliance with regulatory requirements is actually acceptable to the business, then baselines can also reflect that. In that case the answer should be B. Interested in hearing other opinions. Maybe I'm just overthinking it...
upvoted 1 times
Salilgen
6 months, 1 week ago
Compliance is just another risk. Then, IMO it should be B
upvoted 1 times
...
...
oluchecpoint
12 months ago
B. The baselines are proportionate to risk. Security measures should be balanced and aligned with the specific risks faced by an organization. This approach allows for a more efficient allocation of resources and helps avoid overburdening systems with unnecessary security configurations or neglecting critical security measures that are relevant to the organization's risk profile. Therefore, ensuring that security measures are proportionate to the risk is a key principle in effective cybersecurity.
upvoted 1 times
...
Agamennore
1 year ago
Selected Answer: B
Baselines aligned with risk
upvoted 1 times
...
Jae_kes
1 year, 2 months ago
Selected Answer: B
B. The baselines are proportionate to risk.
upvoted 1 times
...
richck102
1 year, 2 months ago
B. The baselines are proportionate to risk.
upvoted 1 times
...
aokisan
1 year, 8 months ago
Selected Answer: A
baseline is followed to standards.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago