Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 520 discussion

Actual exam question from Isaca's CISM
Question #: 520
Topic #: 1
[All CISM Questions]

A business unit handles sensitive personally identifiable information (PII), which presents a significant financial liability to the organization should a breach occur.
Which of the following is the BEST way to mitigate the risk to the organization?

  • A. Implementing audit logging on systems
  • B. Including indemnification into customer contracts
  • C. Contracting the process to a third party
  • D. Purchasing insurance
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
david124
3 weeks, 1 day ago
Selected Answer: A
A, yall need to go study sec+ if you think D
upvoted 1 times
Raven89
2 weeks, 4 days ago
security +, a beginner cert ? really ? RISK = LIKEHOOD * IMPACT and an insurance will reduce impact ....
upvoted 1 times
david124
1 week, 2 days ago
D is transference .....
upvoted 1 times
david124
1 week, 2 days ago
but to be fair, A isnt great either, its a detective control than a mitigate one
upvoted 1 times
...
...
...
...
shootnot
6 months, 1 week ago
D- The keyword here is 'significant financial liability' and having that in mind the best way to mitigate is to 'buy insurance'
upvoted 1 times
...
yottabyte
8 months ago
Selected Answer: D
You will have to perform audit logging anyway to reduce the premium on insurance. Insurance is a must as it contains huge financial penalty.
upvoted 2 times
...
oluchecpoint
9 months, 1 week ago
Selected Answer: D
option D(Purchasing insurance) can help mitigate the financial impact of a data breach. This insurance typically covers costs associated with breach response, legal fees, and potentially some liability
upvoted 1 times
...
POWNED
10 months, 2 weeks ago
Selected Answer: A
When you answer these questions you have to keep in mind you are answering from the material that ISACA gives you: avoid, mitigate, transfer or accept. These terms may vary by framework, or even include another option (e.g., sharing), but the sentiment is the same: We can choose to avoid a thing, thereby bypassing the risk altogether; we can implement some controls to mitigate that thing, thereby lessening the impact of the risk; we can employ risk transfer to help limit damages, perhaps by employing insurance to limit loss exposure; or we can do none of those things, forge ahead and accept the consequences. This comes straight from ISACA https://www.isaca.org/resources/news-and-trends/newsletters/atisaca/2021/volume-6/not-all-risk-treatment-options-are-the-same With this in mind the best answer for the question is A
upvoted 2 times
...
maisarajarrah
10 months, 3 weeks ago
Selected Answer: D
The question is a asking about a mitigation action not what controls to be used. the senario here is about what is the best (MITIGATION ACTION) - if that in future the organisation is breached. - transferring the risk is the best way - and it can be done by purchasing insurance.
upvoted 1 times
maisarajarrah
10 months, 3 weeks ago
The risk being identified here is the financial liability.
upvoted 2 times
...
...
Marcovic00
12 months ago
Selected Answer: A
All answers are not mitigation options, but maybe A is a step to mitigate, insurance is risk transfer not mitigation
upvoted 2 times
maisarajarrah
10 months, 3 weeks ago
WRONG Here are 10 common risk mitigation strategies. Risk acceptance. Risk acceptance acknowledges a risk and accepts its potential consequences without taking further actions to mitigate or eliminate it. ... Risk avoidance. ... Risk transfer. ... purchasing an insurance policy to cover the costs of a data breach Risk sharing. ... Risk buffering. ... Risk strategizing. ... Risk testing. ... Risk quantification.
upvoted 2 times
...
...
koala_lay
1 year, 2 months ago
Selected Answer: A
Implementing audit logging on systems as the best way to mitigate the risk to the organization in this scenario. Audit logging allows for monitoring and tracking of all activities and access to sensitive personally identifiable information (PII). It provides a detailed record of who accessed the information, when, and what actions were taken. This helps in identifying any potential breaches or unauthorized access to the PII, allowing for prompt response and investigation. By implementing audit logging, the organization can enhance its security measures and proactively detect and prevent any breaches, reducing the financial liability associated with a potential data breach.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: A
A. Implementing audit logging on systems - It helps in detection and investigation but does not prevent breaches from occurring. The breaches needs to be detected first, many company will like to avoid paying insurance. NOTE: None of these answer can mitigate. option D(Purchasing insurance) can help mitigate the financial impact of a data breach. This insurance typically covers costs associated with breach response, legal fees, and potentially some liability
upvoted 1 times
...
AaronS1990
1 year, 2 months ago
There are a few questions like this, as everyone points out: D- Is transference not mitigation so logically it can't be the answer. However my issue is that it is the BEST way to lower the risk.
upvoted 1 times
...
wickhaarry
1 year, 3 months ago
D https://reciprocity.com/resources/what-is-risk-mitigation/
upvoted 1 times
...
Goseu
1 year, 4 months ago
C & D are about risk transfer. A is not a risk mitigation , it promotes accountability but it doesn’t reduce the risk . B is the only mitigation action .
upvoted 1 times
...
richck102
1 year, 4 months ago
A. Implementing audit logging on systems
upvoted 1 times
...
Dravidian
1 year, 6 months ago
Selected Answer: D
The risk being identified here is the financial liability. The question is not asking for a control to prevent the risk but to mitigate the risk if and when it occurs. Since this is a financial risk an appropriate control would be Risk transfer, which in this case is Insurance.
upvoted 3 times
...
dark_3k03r
1 year, 7 months ago
Selected Answer: D
The correct answer is (D) Purchasing insurance as this effectively transfer the cost to the insurer. Rationale: A. While Implementing audit logging on systems will help with IR, it does not address the financial liabilities that an organization may face in a breach. B. Including indemnification into customer contracts may solve some of the organization's liability by shifting some of that liability to the customers, but it doesn't protect them against all financial liabilities related to the incident like an insurance policy would. C. Contracting the process to a third party may outsource the responsibility, but not the accountability, and with that accountability comes the exposure to the liabilities. (i.e. still exposed to financial risk cause you can't outsource accountabiltiy)
upvoted 4 times
...
it_expert_cism
1 year, 8 months ago
Mitigation is only possible with D not with A
upvoted 2 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: A
We are talking about risk mitigation no risk transfer. Correct answer A. Mitigate: The organization chooses to mitigate the risk. This takes the form of some action that serves to reduce the probability of a risk event or reduce the impact of a risk event. The actual steps taken may include business process changes, configuration changes, the enactment of a new control, or staff training. • Transfer:The practice of transferring risk is typically achieved through an insurance policy, although other forms are Gregory, Peter H.; Gregory, Peter H.. CISM Certified Information Security Manager Bundle (p. 186). McGraw Hill LLC. Kindle Edition.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...