Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 802 discussion

Actual exam question from Isaca's CISM
Question #: 802
Topic #: 1
[All CISM Questions]

Which of the following BEST supports investments in an information security program?

  • A. Business impact analysis (BIA)
  • B. Risk assessment results
  • C. Gap analysis results
  • D. Business cases
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 9 months ago
Selected Answer: D
D. Business cases.
upvoted 6 times
...
dark_3k03r
Highly Voted 1 year, 7 months ago
Selected Answer: D
The correct answer is (D) Business cases because this is the only one that lists the problem, solution and how much is required to get it done. Thus why it's the only one that supports investment. (A) Business impact analysis (BIA) is incorrect cause it is a decomposition of business processes with the output being RTO, RPO and other such related items. (B) Risk assessment results is incorrect cause this is insufficient cause it doesn't contain the things that would convenience management that a business case has: - goals - list of benefits - costs - risk with the initiatives - implementation plan - evaluation plan The risk assessment only explains risk without the business context. (C) Gap analysis results is incorrect cause this is the difference between the present and future state... but it doesn't say why the business should care which is what you are going to need to get that investment.
upvoted 5 times
...
Booict
Most Recent 3 months, 3 weeks ago
Selected Answer: D
D - Business case itself is what ultimately convinces management to invest in the program.
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: B
B. Risk assessment results Investments in an information security program should be driven by an understanding of the risks that an organization faces. Risk assessment results provide crucial information about the specific threats, vulnerabilities, and potential impacts that an organization may encounter. This information allows decision-makers to prioritize investments in security measures that are most aligned with the organization's risk profile and potential consequences.
upvoted 1 times
...
wickhaarry
1 year, 3 months ago
D. Business cases. Risk accessment results without a business case wont be effective
upvoted 1 times
...
richck102
1 year, 4 months ago
D. Business cases
upvoted 1 times
...
Dravidian
1 year, 6 months ago
Selected Answer: B
I am going with B because I am interpreting this questions - Best supports investment as what is most going to help management side with a decision to invest and nothing does that more than fear of impact and since BIA is a part of risk assessment. I am going with B. You can have all the components in the business case but if they don't see the risk report then they are not investing a penny.
upvoted 3 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: D
Many organizations require the development of a business case prior to approving expenditures on significant security initiatives. A business case is a written statement that describes the initiative and describes its business benefits. Gregory, Peter H.; Gregory, Peter H.. CISM Certified Information Security Manager Bundle (p. 146). McGraw Hill LLC. Kindle Edition.
upvoted 4 times
...
Souvik124
1 year, 9 months ago
Out of the options provided, the BEST approach to support investments in an information security program would be option D, "Business cases."
upvoted 3 times
...
Boomers
1 year, 9 months ago
Selected Answer: B
The answer should be B. B is the basis for D. Business cases you need when you want to present your control requirement to the management. The risk assessment will be the basis for D.
upvoted 4 times
CarlLimps
1 year, 8 months ago
Agree with Boomers on this one. Risk assessment results show very specifically where your risks are and therefore justifies why you need an infosec program.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...