Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?
By informing business management of the risk, the information security manager can initiate discussions and collaboration to assess the potential impact on business activities and make informed decisions on how to proceed. After informing business management, a more detailed risk assessment can be conducted, and appropriate actions such as documenting security exceptions or adjusting settings can be taken based on the outcomes of the risk assessment.
C. Perform a risk assessment.
Performing a risk assessment is crucial to understand the potential risks and their impact on the business before making any decisions. This assessment will help in evaluating the specific risks associated with reducing security hardening settings and provide a basis for informed decision-making. After conducting a risk assessment, the information security manager can then proceed to the appropriate next steps, which may include documenting a security exception (Option A), informing business management of the risk (Option D), and potentially considering adjustments to security settings (Option B) if it is deemed necessary and justifiable based on the risk assessment findings.
When the information security manager becomes aware that security hardening settings may have adverse effects on future business activities, it is essential to communicate this information promptly to business management. By informing business management of the risk, they can assess the potential impact on business operations, evaluate the trade-offs between security and business needs, and make informed decisions about how to proceed.
D, From what I understand Security hardening settings were taken after risk assessment by ISM. So next step will be to Inform Business mgmt of risk . Not sure if I am correct though.
I think so too. Security hardening should respond to the need to mitigate risks. Therefore it is reasonable to think that the assessment has already been carried out.
By conducting a risk assessment, the information security manager can evaluate the potential risks associated with the security hardening settings and assess their potential impact on business activities. This assessment will help in identifying the likelihood and potential consequences of the risks and prioritize them accordingly.
Once the risk assessment is completed, the information security manager can then inform business management of the identified risks and involve them in the decision-making process to determine the appropriate course of action, which may include documenting a security exception, adjusting the security hardening settings, or finding alternative solutions that mitigate the risks while considering business requirements.
From the ISACA CISM exam perspective, the MOST appropriate first step an information security manager should take upon learning that some security hardening settings may negatively impact future business activity is option C: Perform a risk assessment.
Performing a risk assessment involves evaluating the potential impact and likelihood of risks associated with the security hardening settings. By conducting a risk assessment, the information security manager can gather the necessary information to make informed decisions about balancing security requirements with business needs. This step allows for a systematic analysis of the risks involved, considering factors such as the likelihood of occurrence, potential impact, and the organization's risk appetite.
This is not "ISACA CISM exam perspective" you clown! This is ChatGPT/Google Bard perspective and you are spreading misinformation. Just because you don't know your stuff and hope that you can cheat your way to CISM cert via AI doesn't mean that you have to do a disservice to everyone else here.
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aokisan
Highly Voted 1 year, 9 months agoshootnot
Most Recent 5 months, 1 week agomaisarajarrah
9 months, 2 weeks agooluchecpoint
1 year, 1 month agoafc1019
1 year, 2 months agowickhaarry
1 year, 2 months agoAlexJacobson
8 months, 4 weeks agoSalilgen
7 months, 2 weeks agoats20
7 months, 2 weeks agorichck102
1 year, 3 months agowello
1 year, 4 months agomad68
1 year, 5 months agoAlexJacobson
8 months, 4 weeks ago