Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 49 discussion

Actual exam question from Isaca's CISM
Question #: 49
Topic #: 1
[All CISM Questions]

Which of the following is the PRIMARY responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices in its operations?

  • A. Review and update existing security policies.
  • B. Enforce passwords and data encryption on the devices.
  • C. Conduct security awareness training.
  • D. Require remote wipe capabilities for devices.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Azurefox79
Highly Voted 1 year, 3 months ago
Selected Answer: A
A. Again, you have to get out of the technical solution mindset. Its not correct and you will fail. You are a manager and are serving a business function. Policies and procedures are you job, hands on enforcing encryption is for the folks lower on the totem poll. You policy will dictate how other teams will implement the solution - you are hands off baby.
upvoted 17 times
...
greeklover84
Most Recent 1 month, 4 weeks ago
Selected Answer: D
I would go for D. we are talking about mobile devices which might get stolen...and they must get remotely wiped out according to the Security Policy. The question is more related to the mobile device...and not generally to the Policies that the CISO takes care of....in my opinion.
upvoted 1 times
...
oluchecpoint
9 months, 2 weeks ago
Selected Answer: B
While the other options (A, C, and D) are also important responsibilities of an information security manager, enforcing passwords and data encryption on mobile devices directly addresses the security of the devices themselves and the protection of sensitive information they may contain or access.
upvoted 1 times
...
Viperhunter
12 months ago
Selected Answer: B
Enforcing passwords and data encryption on mobile devices is a fundamental security measure to protect sensitive information in case of device loss or theft. Passwords add a layer of access control, and data encryption ensures that even if the device is compromised, the stored data remains secure. While reviewing and updating existing security policies (option A), conducting security awareness training (option C), and requiring remote wipe capabilities for devices (option D) are important aspects of mobile device security, enforcing passwords and data encryption directly addresses the protection of data on the devices themselves, which is a foundational responsibility for information security managers in a mobile device implementation scenario.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
B While the other options (A, C, and D) are also important responsibilities of an information security manager, enforcing passwords and data encryption on mobile devices directly addresses the security of the devices themselves and the protection of sensitive information they may contain or access.
upvoted 1 times
...
odus1
1 year, 3 months ago
b option will be a subset of a. so A is more correct
upvoted 1 times
...
Goseu
1 year, 4 months ago
A looks good
upvoted 1 times
...
DavoA
1 year, 4 months ago
Selected Answer: B
Enforce passwords and data encryption on the devices = primary responsibility
upvoted 1 times
...
drewl25
1 year, 4 months ago
The primary responsibility of an information security manager in an organization that is implementing the use of company-owned mobile devices is to enforce passwords and data encryption on the devices. Mobile devices, such as smartphones and tablets, are highly portable and can contain sensitive information. Enforcing passwords and data encryption on these devices is essential for maintaining the security and confidentiality of the data they hold. By requiring strong passwords and implementing data encryption, the information security manager helps protect the devices and the information stored on them from unauthorized access. Passwords ensure that only authorized users can access the devices, while data encryption adds an additional layer of protection by encoding the data to prevent unauthorized viewing or retrieval in case the device is lost or stolen.
upvoted 1 times
...
Nillanash
1 year, 4 months ago
C- Conduct security training. To increase awareness on the staff.
upvoted 2 times
...
karanvp
1 year, 5 months ago
Whose responsibilities of B and D?
upvoted 1 times
...
richck102
1 year, 6 months ago
A. Review and update existing security policies.
upvoted 1 times
...
Antonivs
1 year, 9 months ago
Selected Answer: A
A, then B & D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...