Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 618 discussion

Actual exam question from Isaca's CISM
Question #: 618
Topic #: 1
[All CISM Questions]

An organization plans to utilize Software as a Service (SaaS) and is in the process of selecting a vendor. What should the information security manager do FIRST to support this initiative?

  • A. Review independent security assessment reports for each vendor.
  • B. Benchmark each vendor's services with industry best practices.
  • C. Define information security requirements and processes.
  • D. Analyze the risks and propose mitigating controls.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 9 months ago
Selected Answer: C
Defining information security requirements and processes is the first step that the information security manager should take when supporting the organization's use of Software as a Service (SaaS). This is because it sets the foundation for the selection of a SaaS vendor that meets the organization's security needs and expectations. Without clear security requirements and processes, it may be difficult to determine the level of security that each vendor can provide, or to assess the suitability of each vendor for the organization's specific needs. By establishing the security requirements and processes first, the information security manager can ensure that the selection of a SaaS vendor aligns with the organization's overall information security strategy.
upvoted 6 times
...
beever
Highly Voted 1 year, 9 months ago
Selected Answer: A
A is correct, its talking about "selecting a vendor". C would be correct if writing the RFQ
upvoted 6 times
...
Booict
Most Recent 2 months, 3 weeks ago
Selected Answer: C
C for me
upvoted 1 times
...
AlexJacobson
9 months, 4 weeks ago
Selected Answer: C
Damn...another one... So let's see... Looking at the scenario, the most logical sequence of things should be C, A, D, A. I guess if we're still in the process of selecting a vendor, that means nothing's really decided yet so first you figure out the security requirements and processes and based on that you start checking the vendors (through independent audit reports, so as objective as possible). Then when you understand all the risks with each vendor you propose mitigation. And lastly you do security monitoring of vendors services through security benchmarks.
upvoted 2 times
...
ec2bdb1
10 months ago
Selected Answer: A
Because the questions says "In the process". It means the requirements and process are defined already.
upvoted 1 times
...
CISSPST
1 year, 1 month ago
Selected Answer: D
Analyze the risks in using SaaS solution. Identify the controls. (D) These are then translated into security requirements (C). How else will you know what the security requirements are?
upvoted 1 times
...
6and0
1 year, 2 months ago
Selected Answer: C
Once you have identified which processes can be outsourced as well as their inherent risks, you can begin performing due diligence on potential vendors. The level of due diligence should be tailored to the significance of the relationship as well as the potential risks it poses. Document your requirements and request prospective vendors to address each item directly https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2019/third-party-vendor-selection-if-done-right-its-a-win-win
upvoted 1 times
CISSPST
1 year, 1 month ago
Let me draw your attention to what you wrote: Once you have IDENTIFIED which processes can be outsourced as well as their inherent RISKS, you can begin performing due diligence on potential vendors. The level of due diligence should be tailored to the significance of the relationship as well as the potential RISKS IT POSES I'm thinking you meant to select D???
upvoted 1 times
...
...
Kunzle
1 year, 2 months ago
Selected Answer: C
Before evaluating vendors or analyzing risks, it's crucial to understand what the organization's specific security needs and expectations are
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: C
Defining information security requirements and processes should be the initial step to ensure that the organization's specific security needs are understood and can serve as a foundation for subsequent activities such as risk analysis, benchmarking, and vendor assessment
upvoted 1 times
...
AidanSun
1 year, 3 months ago
Selected Answer: C
Define what you need, then select the most suitable one based on your needs and expectations.
upvoted 1 times
...
wickhaarry
1 year, 3 months ago
A ) First Review then define
upvoted 1 times
...
richck102
1 year, 4 months ago
C. Define information security requirements and processes.
upvoted 1 times
...
wello
1 year, 5 months ago
Selected Answer: C
FIRST he needs to define the security requirements and processes relative to the new SaaS and then he can review reports based on these requirements to see if vendors comply.
upvoted 1 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: C
"Selecting a vendor" : C
upvoted 2 times
...
MyKasala
1 year, 10 months ago
Selected Answer: C
I think C
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...