exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 623 discussion

Actual exam question from Isaca's CISM
Question #: 623
Topic #: 1
[All CISM Questions]

Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

  • A. Document a security exception.
  • B. Reduce security hardening settings.
  • C. Perform a risk assessment.
  • D. Inform business management of the risk.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aokisan
Highly Voted 1 year, 9 months ago
Selected Answer: C
at first, evaluate.
upvoted 8 times
...
shootnot
Most Recent 5 months, 1 week ago
C- then D, otherwise if you go D first management will ask the same question, what is the risk, go back and do C first.
upvoted 2 times
...
maisarajarrah
9 months, 2 weeks ago
Selected Answer: D
By informing business management of the risk, the information security manager can initiate discussions and collaboration to assess the potential impact on business activities and make informed decisions on how to proceed. After informing business management, a more detailed risk assessment can be conducted, and appropriate actions such as documenting security exceptions or adjusting settings can be taken based on the outcomes of the risk assessment.
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
Selected Answer: C
C. Perform a risk assessment. Performing a risk assessment is crucial to understand the potential risks and their impact on the business before making any decisions. This assessment will help in evaluating the specific risks associated with reducing security hardening settings and provide a basis for informed decision-making. After conducting a risk assessment, the information security manager can then proceed to the appropriate next steps, which may include documenting a security exception (Option A), informing business management of the risk (Option D), and potentially considering adjustments to security settings (Option B) if it is deemed necessary and justifiable based on the risk assessment findings.
upvoted 1 times
...
afc1019
1 year, 2 months ago
Selected Answer: D
When the information security manager becomes aware that security hardening settings may have adverse effects on future business activities, it is essential to communicate this information promptly to business management. By informing business management of the risk, they can assess the potential impact on business operations, evaluate the trade-offs between security and business needs, and make informed decisions about how to proceed.
upvoted 2 times
...
wickhaarry
1 year, 2 months ago
D, From what I understand Security hardening settings were taken after risk assessment by ISM. So next step will be to Inform Business mgmt of risk . Not sure if I am correct though.
upvoted 3 times
AlexJacobson
8 months, 4 weeks ago
Makes sense. Would go with D as well.
upvoted 2 times
...
Salilgen
7 months, 2 weeks ago
I think so too. Security hardening should respond to the need to mitigate risks. Therefore it is reasonable to think that the assessment has already been carried out.
upvoted 1 times
...
ats20
7 months, 2 weeks ago
I'm leaning towards D as well, as the question says upon learning which i'm assuming learning from the risk assessment.
upvoted 1 times
...
...
richck102
1 year, 3 months ago
C. Perform a risk assessment.
upvoted 1 times
...
wello
1 year, 4 months ago
Selected Answer: C
By conducting a risk assessment, the information security manager can evaluate the potential risks associated with the security hardening settings and assess their potential impact on business activities. This assessment will help in identifying the likelihood and potential consequences of the risks and prioritize them accordingly. Once the risk assessment is completed, the information security manager can then inform business management of the identified risks and involve them in the decision-making process to determine the appropriate course of action, which may include documenting a security exception, adjusting the security hardening settings, or finding alternative solutions that mitigate the risks while considering business requirements.
upvoted 1 times
...
mad68
1 year, 5 months ago
Selected Answer: C
From the ISACA CISM exam perspective, the MOST appropriate first step an information security manager should take upon learning that some security hardening settings may negatively impact future business activity is option C: Perform a risk assessment. Performing a risk assessment involves evaluating the potential impact and likelihood of risks associated with the security hardening settings. By conducting a risk assessment, the information security manager can gather the necessary information to make informed decisions about balancing security requirements with business needs. This step allows for a systematic analysis of the risks involved, considering factors such as the likelihood of occurrence, potential impact, and the organization's risk appetite.
upvoted 3 times
AlexJacobson
8 months, 4 weeks ago
This is not "ISACA CISM exam perspective" you clown! This is ChatGPT/Google Bard perspective and you are spreading misinformation. Just because you don't know your stuff and hope that you can cheat your way to CISM cert via AI doesn't mean that you have to do a disservice to everyone else here.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago