Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 505 discussion

Actual exam question from Isaca's CISM
Question #: 505
Topic #: 1
[All CISM Questions]

When building support for an information security program, which of the following elements is MOST important?

  • A. Business impact analysis (BIA)
  • B. Identification of existing vulnerabilities
  • C. Threat analysis
  • D. Information risk assessment
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Dravidian
Highly Voted 1 year, 6 months ago
Selected Answer: A
BIA - While building support it would be most helpful to know how you will be affected, also a BIA needs to be conducted before a risk assessment.
upvoted 9 times
...
TitanD
Most Recent 1 month ago
Selected Answer: D
An information security program would be risk based, BIA only provide worse case scenarios but risk assessment would include impact (BIA) x likelihood which would be more useful and important.
upvoted 2 times
...
Raj91188
2 months, 1 week ago
Selected Answer: D
D. Information risk assessment. Information risk assessment is the most important element because it provides a clear understanding of how security risks affect the organization and helps secure management buy-in for the security program.
upvoted 2 times
...
yottabyte
8 months ago
Selected Answer: A
leaning towards A
upvoted 1 times
...
POWNED
9 months, 3 weeks ago
Selected Answer: A
The risk assessment helps to identify potential threats, while the BIA helps prioritize which processes are most critical to the business. Answer is A
upvoted 2 times
...
CISSPST
1 year, 1 month ago
Selected Answer: D
I have read several explanations below. Addressing just few to help others understand the flaws in the arguments. Please note, I mean no disrespect to the comment owners. Dravidian: How you will be affected, i.e., impact is important. But what if likelihood is zero. BIA considers only internal factors (value of asset to business). RA considers both internal and external factors (threats, likelihood, vulnerabilities, exposure, and impact). BIA can be conducted before or sometimes as part of risk assessment. Besides, the question is asking not about what is done first but what is most important. 6and0: It is not uncommon for BIA to be done before establishing the IS program. Afterall, Risk Assessment is incomplete without impact assessment. To build support for IS program, threat, vulnerability, or impact by themselves mean nothing if the
upvoted 2 times
CISSPST
1 year, 1 month ago
sorry...the above comment was incomplete. To build support for IS program, threat, vulnerability, or impact by themselves are inadequate to demonstrate relevance to business. Risk assessments give a more complete picture.
upvoted 1 times
...
...
kristofer8
1 year, 2 months ago
Selected Answer: D
Risk assessment first!
upvoted 1 times
...
6and0
1 year, 2 months ago
Selected Answer: D
Guys, please stop using ChatGPT to justify your answers. You are doing a disservice to yourself and others. Keywords in the question - building support for an information security program Business impact analysis (BIA) – When are you preforming the BIA? Before you have an established info security program? Im going with D. Information risk assessment- Yes, I don’t like the wording “Information” being part of it. But my guess is its not in the answer in the actual exam.
upvoted 3 times
...
Cert_IT
1 year, 2 months ago
Selected Answer: A
A. Business impact analysis (BIA) When building support for an information security program, the most important element is often the business impact analysis (BIA). The BIA helps organizations understand the potential impact of various security incidents and threats on their business operations. It identifies critical assets, processes, and functions and assesses how their disruption could affect the organization's ability to achieve its objectives. By demonstrating the potential financial, operational, and reputational risks associated with security incidents, a BIA can help stakeholders, including senior management and decision-makers, recognize the importance of investing in and supporting information security measures. It provides the necessary context to prioritize security efforts and allocate resources effectively to mitigate risks and protect the organization's interests.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: C
D. Information risk assessment: This is typically considered the most important element because it forms the foundation of your information security program. A risk assessment helps you identify and understand the risks your organization faces, which is crucial for making informed decisions about where to allocate resources and what security measures to implement. it typically comes after risk assessment and threat analysis in the planning process. BIA helps you prioritize resources and develop strategies to minimize the impact of security incidents.
upvoted 2 times
...
Goseu
1 year, 4 months ago
Selected Answer: D
D , Bia has to do mostly with BCP
upvoted 1 times
Goseu
1 year, 4 months ago
My bad , its BIA .
upvoted 1 times
Goseu
1 year, 3 months ago
Afte reconsideration is D , risk assessment , key word building which lead me to planning phase of information security program.
upvoted 1 times
...
...
...
richck102
1 year, 4 months ago
i vote ........D. Information risk assessment
upvoted 1 times
...
Saisharan
1 year, 5 months ago
Option A
upvoted 2 times
...
mad68
1 year, 6 months ago
Selected Answer: A
Therefore, option A, Business Impact Analysis (BIA), is the most important element when building support for an information security program. It helps stakeholders understand the significance of information security measures in protecting critical business functions and assets
upvoted 4 times
...
Tsubasa1234
1 year, 7 months ago
Selected Answer: D
D information risk assessment is the most important element when building support for an information security program. An information risk assessment is the process of evaluating what information assets an organization holds, how critical they are, and what threats and risks they are exposed to. The information risk assessment helps prioritize risks and is used to determine the resources and priorities needed for the program. Other options, BIA, threat analysis, and identification of existing vulnerabilities may be included in the information risk assessment, but are each part of the information risk assessment.
upvoted 1 times
...
CarlLimps
1 year, 9 months ago
Selected Answer: D
This is D. A risk assessment will inform the business of the infosec risks and provide justification/business case. ALSO a BIA is done on a system like an ERP, it would not be used to justify an infosec program.
upvoted 3 times
...
Souvik124
1 year, 9 months ago
When building support for an information security program, the MOST important element is the Information risk assessment (Option D).
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...