exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 39 discussion

Actual exam question from Isaca's CISM
Question #: 39
Topic #: 1
[All CISM Questions]

Which of the following is the MOST effective approach for determining whether an organization's information security program supports the information security strategy?

  • A. Ensure resources meet information security program needs
  • B. Audit the information security program to identify deficiencies
  • C. Identify gaps impacting information security strategy
  • D. Develop key performance indicators (KPIs) of information security
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
andyprior
2 weeks, 3 days ago
Selected Answer: C
Among these options, C. Identify gaps impacting information security strategy emerges as the most effective approach. This method not only highlights deficiencies but also focuses on strategic alignment, ensuring that any identified gaps can be addressed to enhance support for organizational objectives. By understanding where misalignments exist, organizations can take targeted actions to bridge those gaps, thereby strengthening their overall information security posture in relation to their strategic goals.
upvoted 1 times
...
6b41e93
3 weeks, 5 days ago
Selected Answer: B
while identifying gaps gives you a list of what’s wrong, auditing assesses the whole system’s health — it tells you what’s wrong, why it’s wrong, and often how to fix it. This comprehensive insight is crucial for aligning the security program with strategic objectives effectively.
upvoted 1 times
...
kvdvliert
3 weeks, 6 days ago
Selected Answer: C
By identifying gaps, the organization can directly assess how well the current security program aligns with and supports the strategic objectives. This approach helps in pinpointing specific areas where the program may be falling short and allows for targeted improvements to ensure that the security measures in place are effectively supporting the overall strategy
upvoted 1 times
...
greeklover84
3 months, 2 weeks ago
Selected Answer: D
D makes more sense.
upvoted 1 times
...
SHERLOCKAWS
1 year ago
Selected Answer: D
D. Develop key performance indicators (KPIs) of information security Most Voted
upvoted 2 times
...
POWNED
1 year, 1 month ago
Selected Answer: D
What you have to keep in mind for this test is what is the best option so that everyone can track what is going on. For this question that would be KPI. KPI's are user friendly charts and graphs that a child could understand what is going on. This would be a great tool in order to show the stakeholders what is going on.
upvoted 4 times
...
Viperhunter
1 year, 1 month ago
Selected Answer: C
Identifying gaps impacting the information security strategy involves assessing the alignment between the information security program and the overarching security strategy. This approach helps identify any deficiencies, misalignments, or areas where the information security program falls short in supporting the strategic objectives. By understanding these gaps, the organization can take targeted actions to improve the alignment between the program and the strategy. While options like ensuring resources meet information security program needs (option A), auditing the information security program to identify deficiencies (option B), and developing key performance indicators (KPIs) of information security (option D) are important activities, identifying and addressing gaps in alignment with the information security strategy is a proactive step toward improving overall effectiveness.
upvoted 3 times
...
AaronS1990
1 year, 3 months ago
Selected Answer: D
A few feasible answers here and none are brilliant. D however is the best one
upvoted 4 times
...
oluchecpoint
1 year, 4 months ago
D Developing key performance indicators (KPIs) for information security allows for a continuous, data-driven assessment of how well the information security program aligns with and supports the information security strategy. This approach helps in identifying areas of improvement, optimizing resource allocation, and ensuring that security efforts are effective in achieving strategic objectives.
upvoted 3 times
...
kaibutsu
1 year, 4 months ago
These are so frustrating. There’s not a definitive answer. The discussions are great but there are so many discussions on these test questions that it makes me question what’s right.
upvoted 4 times
...
Patt70
1 year, 4 months ago
Answer is D. KPI would show the approach in a tangible format to ensure the security programme is aligned with security strategy.
upvoted 2 times
...
Azurefox79
1 year, 5 months ago
Selected Answer: D
D is correct. C is incorrect because a security strategy is far too vague to identify any gaps. Its meant to be vague. KPIs are metrics and always BEST option.
upvoted 3 times
...
DavoA
1 year, 5 months ago
Selected Answer: D
KPI will provide the metrics here
upvoted 2 times
...
JKatta2023
1 year, 6 months ago
KPI's are more effective than audit. KPI's are more frequent than audits, which will help to know if it is effective.
upvoted 1 times
...
karanvp
1 year, 6 months ago
Measuring performance always tells the exact effectiveness of the program to achive it's objectives
upvoted 1 times
...
richck102
1 year, 7 months ago
C. Identify gaps impacting information security strategy
upvoted 1 times
...
Dravidian
1 year, 8 months ago
Selected Answer: B
D is the right answer. The question is asking for the MOST effective approach. While a gap analysis will help find out what they need to align the ISP to the strategy better. KPIs will help them show if the ISP is actually working as the strategy has outlined it.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago