Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 568 discussion

Actual exam question from Isaca's CISM
Question #: 568
Topic #: 1
[All CISM Questions]

Which of the following is the MOST important input to the development of an effective information security strategy?

  • A. Well-defined security policies and procedures
  • B. Current and desired state of security
  • C. Business processes and requirements
  • D. Risk and business impact assessments
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
mohit05
Highly Voted 1 year, 10 months ago
Selected Answer: C
C. Business processes and requirements An effective information security strategy should align with the overall business objectives and support the organization's processes and requirements. Without understanding the business processes and requirements, it is difficult to develop a strategy that addresses the specific needs of the organization and aligns with its goals. A security strategy that does not align with the organization's objectives and processes is less likely to be effective in reducing risk and protecting the organization's assets.
upvoted 12 times
...
Booict
Most Recent 2 months, 3 weeks ago
Selected Answer: D
D - Risk assessments help identify and prioritize the most significant threats to the organization, ensuring that the security strategy addresses the most critical areas first.
upvoted 1 times
...
Salilgen
8 months, 2 weeks ago
Selected Answer: B
I am not sure but I'd go with B. Risk and business impact assessments are most important input to define current state. Business processes and requirement are most important input to define desiderate state.
upvoted 1 times
...
Marcovic00
1 year ago
Selected Answer: C
B is very tempting and i went for it first but C is the correct answer
upvoted 1 times
...
secdoc
1 year, 1 month ago
The question asks about the "development" of a strategy not one that already exists in which case you could compare existing with desired states. It is definitely C
upvoted 2 times
...
koala_lay
1 year, 2 months ago
Selected Answer: B
Agree to the answer B Current and desired state of security
upvoted 2 times
...
Cert_IT
1 year, 2 months ago
Selected Answer: D
D. The MOST important input to the development of an effective information security strategy is risk and business impact assessments.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: B
B. Current and desired state of security Understanding the current state of security (the existing vulnerabilities, threats, and weaknesses) and the desired state of security (the goals and objectives for improved security) is fundamental to developing an effective information security strategy. Without this understanding, it's challenging to define the direction, priorities, and actions necessary to protect an organization's information assets.
upvoted 4 times
koala_lay
1 year, 2 months ago
Agree to the answer B
upvoted 1 times
...
...
Goseu
1 year, 4 months ago
Selected Answer: B
B sounds correct.
upvoted 1 times
...
45
1 year, 4 months ago
Selected Answer: B
I have been an auditor, and in my experience all strategies have contained a current state & desired state roadmap. I will be going with B 👍🏼
upvoted 2 times
...
richck102
1 year, 4 months ago
C. Business processes and requirements
upvoted 2 times
...
wello
1 year, 5 months ago
Selected Answer: B
By assessing the current state of security and comparing it to the desired state, organizations can determine the necessary steps and initiatives to bridge the gaps and achieve their security goals. This analysis helps in setting priorities, allocating resources, and creating a roadmap for implementing security controls and measures.
upvoted 1 times
...
Dravidian
1 year, 7 months ago
Selected Answer: B
Most important input would be the target identified by gap analysis. Without this you can't build a strategy even if you know what the business processes and requirements are.
upvoted 2 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: C
Business processes and requirements.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...