exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 738 discussion

Actual exam question from Isaca's CISM
Question #: 738
Topic #: 1
[All CISM Questions]

Which of the following is MOST helpful for aligning security operations with the IT governance framework?

  • A. Business impact analysis (BIA)
  • B. Security operations program
  • C. Information security policy
  • D. Security risk assessment
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 8 months ago
An information security policy is a document that outlines an organization's approach to managing and protecting sensitive information. It defines the roles, responsibilities, and expectations for individuals within the organization with regards to security, and provides a framework for how security should be integrated into the day-to-day operations of the organization. The information security policy is critical for aligning security operations with the IT governance framework as it provides a clear set of guidelines and expectations for everyone in the organization. It helps ensure that security is integrated into the overall strategy and decision-making processes of the organization, and that security is considered in all aspects of the business. By providing a common understanding of security goals, principles, and procedures, the information security policy helps ensure that security is integrated into the organization's governance structure and that security operations are aligned with the broader objectives of the organization.
upvoted 11 times
...
shootnot
Most Recent 5 months, 1 week ago
B by the process of elimination- None of the other choices would help in any alignment. Although B doesn't make any sense either
upvoted 1 times
...
Thavee
6 months ago
Selected Answer: C
Security operations program?? Do we have this kind of term? Information security program--> yes. I do no think the term program is applied to the operation level which is lower than Organizational level.
upvoted 1 times
...
AlexJacobson
8 months, 3 weeks ago
Selected Answer: C
I'm gonna go with C. IMO, if you are aligning IT function and processes with security function, the binding document should be security policy, which is dictating what has to be done. Security operations will use IT to achieve that.
upvoted 1 times
...
POWNED
8 months, 3 weeks ago
Selected Answer: C
First time in the 738 questions I have ran into "security operations program". Looked up security operations program through ISACA and found nothing on the topic. I am going to have to go with information security policy for this one.
upvoted 3 times
POWNED
8 months, 3 weeks ago
Policy- Statement of expectation, enforced by standards. This is for sure C
upvoted 1 times
...
...
Cyberbug2021
11 months ago
Selected Answer: D
A security risk assessment is the MOST helpful for aligning security operations with the IT governance framework. This is because a security risk assessment identifies and prioritizes the organization's most critical assets and the threats to those assets. This information can then be used to develop security controls that are aligned with the organization's overall risk tolerance.
upvoted 1 times
...
koala_lay
1 year ago
Selected Answer: C
Out of the options provided, the MOST helpful for aligning security operations with the IT governance framework would be option C: Information security policy. An information security policy defines the organization's approach and requirements for securing its information assets. It outlines the goals, responsibilities, and guidelines for information security management within the organization. By having a well-defined information security policy, security operations can align their activities and processes with the broader IT governance framework. While the other options also play important roles in security operations, they may not directly address the alignment with the IT governance framework in the same way as an information security policy.
upvoted 3 times
...
richck102
1 year, 3 months ago
B. Security operations program
upvoted 1 times
...
cybervds
1 year, 3 months ago
The information security policy sets the overarching goals, principles, and requirements for security within an organization. It provides the high-level guidance and direction for security operations. The policy informs the development of the security operations program. On the other hand, the security operations program defines the specific activities, processes, and procedures for managing security operations on a day-to-day basis. It translates the requirements and objectives outlined in the information security policy into actionable tasks and practices. The security operations program ensures that security operations are executed in a systematic and controlled manner, aligning with the organization's governance framework. In summary, the information security policy provides the guiding principles, while the security operations program operationalizes those principles into specific practices. Both are crucial for aligning security operations with the IT governance framework.
upvoted 3 times
...
wello
1 year, 4 months ago
Selected Answer: B
B. Security operations program
upvoted 2 times
...
mad68
1 year, 5 months ago
Selected Answer: B
B. Security operations program. A security operations program is specifically designed to align security operations with the overall IT governance framework. It provides a structured approach to managing and executing security operations activities, such as incident detection and response, vulnerability management, threat intelligence, and security monitoring. By implementing a comprehensive security operations program, organizations can ensure that security operations are aligned with the objectives, policies, and requirements defined by the IT governance framework.
upvoted 3 times
...
bambs
1 year, 7 months ago
Selected Answer: B
A security operations program provides a framework for managing security operations, including incident management, vulnerability management, and threat intelligence
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago