Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 808 discussion

Actual exam question from Isaca's CISM
Question #: 808
Topic #: 1
[All CISM Questions]

To confirm that a third-party provider complies with an organization's information security requirements, it is MOST important to ensure:

  • A. contract clauses comply with the organization's information security policy.
  • B. security metrics are included in the service level agreement (SLA).
  • C. the information security policy of the third-party service provider is reviewed.
  • D. right to audit is included in the service level agreement (SLA).
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Wladysk
Highly Voted 1 year, 9 months ago
Selected Answer: D
D can be also an option. Right to audit as a part of the SLA Security Clause. Justification: Reviewing the information security policy is the lowest level of assurance and is realized by performing self-assessments of provided documentation. The second level of assurance is realized by third-party statements. For Business Critical Security Controls the third level of assurance is realized by continuous auditing executed based on the SLA Security Clause.
upvoted 7 times
...
CarlLimps
Highly Voted 1 year, 8 months ago
Selected Answer: D
I like D too. I think the most important word in the question is "confirm". How do you confirm, ensure you have a right to audit their program, which allows you to confirm.
upvoted 6 times
...
Booict
Most Recent 3 months, 3 weeks ago
Selected Answer: D
D - Include the right to audit in the SLA allows the organization to periodically review and verify the third-party provider’s compliance with the agreed-upon security requirements. This provides a more dynamic and enforceable approach to ensuring ongoing compliance. Option C does not guarantee that the provider will continue to comply with the organization’s security requirements over time.
upvoted 1 times
...
AlexJacobson
9 months, 3 weeks ago
Selected Answer: D
To confirm = audit
upvoted 1 times
...
FantasyDream
10 months, 1 week ago
Selected Answer: C
"confirm" the "requirement", review should be fine. Should we put the "right to audit" in contract but no in SLA?
upvoted 1 times
...
Marcovic00
12 months ago
Selected Answer: D
to be able to confirm review is not enough u have to audit
upvoted 1 times
...
richck102
1 year, 4 months ago
D. right to audit is included in the service level agreement (SLA).
upvoted 1 times
...
wello
1 year, 5 months ago
Selected Answer: D
Option D allows you to "confirm" compliance.
upvoted 2 times
...
Souvik124
1 year, 9 months ago
Out of the options provided, the MOST important thing to ensure when confirming that a third-party provider complies with an organization's information security requirements would be option D, "Right to audit is included in the service level agreement (SLA)."
upvoted 2 times
...
Souvik124
1 year, 9 months ago
Selected Answer: A
A makes sense
upvoted 2 times
...
Broesweelies
1 year, 9 months ago
Selected Answer: C
Confirming that a third-party provider complies with an organization's information security requirements is crucial to ensure the protection of sensitive data and systems. The most important step in this process is to review the information security policy of the third-party service provider. This review helps to determine the provider's security posture and identify any potential security risks associated with their services. It ensures that the provider's policies, procedures, and controls align with the organization's own information security requirements and that the provider is committed to protecting sensitive data and systems. By reviewing the information security policy of the third-party provider, organizations can make informed decisions about their security arrangements and ensure that they are able to manage and mitigate risks effectively. This is why reviewing the information security policy of the third-party provider is the most important step in confirming their compliance with an organization's information security requirements.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...