exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 696 discussion

Actual exam question from Isaca's CISM
Question #: 696
Topic #: 1
[All CISM Questions]

Which of the following is the FIRST step to establishing an effective information security program?

  • A. Assign accountability
  • B. Perform a business impact analysis (BIA)
  • C. Create a business case
  • D. Conduct a compliance review
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
drewl25
Highly Voted 1 year, 2 months ago
Selected Answer: C
The first step to establishing an effective information security program is to create a business case (option C). A business case outlines the justification for the program by identifying the business needs, goals, objectives, potential benefits, and costs associated with implementing the security program. Creating a business case helps secure organizational buy-in and support for the program. It provides a clear understanding of why the program is necessary and what it aims to achieve. The business case also serves as a foundation for obtaining the necessary resources and funding to implement the program effectively.
upvoted 10 times
...
wello
Highly Voted 1 year, 4 months ago
Selected Answer: B
The logical sequence of events would be: 1. Perform a business impact analysis (BIA) to understand the criticality and potential impacts of security incidents on business processes. 2. Use the findings from the BIA to create a business case that outlines the rationale, costs, benefits, and risks associated with implementing an information security program. 3. Once the business case is approved, assign accountability, establish roles and responsibilities, and begin the implementation of the information security program.
upvoted 6 times
...
shootnot
Most Recent 5 months, 1 week ago
C- the question is about 'establishing a program' in an organization. So from an ISM perspective that takeaway would be a business case. Part of building a business case would require BIA.
upvoted 1 times
...
REHAMAZZAM
8 months, 2 weeks ago
Selected Answer: C
C. Create a business case The first step to establishing an effective information security program is to create a business case. A business case outlines the rationale for investing in information security measures by identifying the potential benefits, risks, costs, and strategic alignment with the organization's objectives. It helps garner support from stakeholders and decision-makers, securing the necessary resources and commitment to initiate the information security program. While options A, B, and D (Assign accountability, Perform a business impact analysis, Conduct a compliance review) are important steps in the process, creating a business case provides the foundational justification and framework for establishing the program.
upvoted 1 times
...
AlexJacobson
8 months, 3 weeks ago
Selected Answer: C
I'm gonna go with C. The reason for that is that business case is defined as a justification for the effort and investment in the project, and information security program is considered "a project".
upvoted 3 times
...
maisarajarrah
9 months, 2 weeks ago
Selected Answer: C
Selected Answer: C
upvoted 1 times
...
Uncle_Lucifer
10 months, 2 weeks ago
Selected Answer: C
Buisness case -> C BIA is for BCP / incidence response. No way its BIA
upvoted 2 times
Uncle_Lucifer
10 months, 2 weeks ago
Ok. I see why BIA can be correct. Buisness case is too generic
upvoted 1 times
...
...
Soleandheel
11 months ago
Performing a BIA is part of creating a business case. Creating a business case encompasses performing a Business Imapct Analysis. You typically perform a BIA after a strategy is already established. As such, C. Create a business case is the best answer especially as it will encompass a BIA.
upvoted 1 times
...
oluchecpoint
1 year, 1 month ago
Selected Answer: B
B. Perform a business impact analysis (BIA). Before assigning accountability, creating a business case, or conducting a compliance review, it's important to understand the potential risks and impacts to your organization's information and data. A business impact analysis helps identify critical assets, assess the potential impact of various threats and vulnerabilities, and prioritize security measures accordingly. This analysis forms the foundation for designing an effective information security program.
upvoted 1 times
...
Goseu
1 year, 3 months ago
Selected Answer: B
B. ofc
upvoted 1 times
...
richck102
1 year, 3 months ago
B. Perform a business impact analysis (BIA)
upvoted 1 times
...
bambs
1 year, 6 months ago
Selected Answer: B
Performing a business impact analysis (BIA) is the first step to establishing an effective information security program. This is because a BIA helps identify the critical assets, systems, and processes of an organization, as well as the potential threats and vulnerabilities that could affect them.
upvoted 2 times
...
Broesweelies
1 year, 8 months ago
Selected Answer: B
While creating a business case is important in establishing an effective information security program, it is typically not the first step. The first step is usually to understand the potential impacts to the organization in the event of a security breach or disruption to the normal course of business operations. This is where a Business Impact Analysis (BIA) comes into play, as it helps identify and prioritize the critical systems, processes and data that must be protected. A BIA is the foundation for creating an effective information security program, including determining the scope, risk management strategies, and allocation of resources.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago