exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 610 discussion

Actual exam question from Isaca's CISM
Question #: 610
Topic #: 1
[All CISM Questions]

An organization involved in e-commerce activities operating from its home country opened a new office in another country with stringent security laws. In this scenario, the overall security strategy should be based on:

  • A. risk assessment results.
  • B. international security standards.
  • C. the most stringent requirements.
  • D. the security organization structure.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Souvik124
Highly Voted 1 year, 10 months ago
In this scenario, the overall security strategy should be based on the most stringent requirements, which means complying with the security laws and regulations of the country where the new office is located.
upvoted 11 times
xcjxcj
10 months ago
In this case, we should create local version of policy and standards, but not changing strategy
upvoted 3 times
...
...
Josef4CISM
Most Recent 2 days ago
Selected Answer: A
I strongly disagree with C. Information security should be appropriate, meaning that controls that are overly excessive should not be applied. By adopting the most stringent requirements from a local country to a global organization, all other regional business units may need to implement unnecessary stringent controls. Instead, the security manager should conduct a risk assessment and identify appropriate measures as a next step (risk based approach - balancing cost and benefits).
upvoted 1 times
...
d7a2ba6
3 weeks, 4 days ago
Selected Answer: A
You do a risk assessment and only follow the stringent (expensive) regulation if it is worth following. (The penalty is higher than the cost of implementing the regulation).
upvoted 1 times
...
Booict
4 months, 2 weeks ago
Selected Answer: C
My answer is C
upvoted 2 times
...
03allen
6 months, 3 weeks ago
Selected Answer: C
base on the most restricted if you cannot provide a local policy.
upvoted 1 times
...
Thavee
9 months ago
Selected Answer: C
Agreed with C, but in the real life, it would be costly if my pool of customers from 20 countries, only one is most stringent. That meant i will have to rework on my others e-commerce sites.
upvoted 1 times
...
xcjxcj
10 months ago
Selected Answer: A
A. is correct. I think most people selected C because local regulations should override on company security policies. But C is saying most stringent requirement, which is not regulation or compliance. imagine all your doc can be only viewed after 2 levels of decryption. (C)
upvoted 1 times
...
POWNED
11 months, 3 weeks ago
Selected Answer: C
I believe the answer is C. Why I believe this is C because its asking what the security strategy will be based off of. Once you have understanding of the security requirements (C) you will then do a risk assessment to find the gaps. If you go straight to a risk assessment you will have no idea what requirements need to be met.
upvoted 1 times
...
Marcovic00
1 year, 1 month ago
Selected Answer: A
compliance can be treated as any other risk
upvoted 1 times
...
bradseth
1 year, 3 months ago
Selected Answer: C
C based on the question
upvoted 1 times
...
CISSPST
1 year, 3 months ago
Selected Answer: C
PFB the excerpt from ISACA Review Manual 16th ed. Page 32 1.3 "......the global enterprise may need to establish different security strategies for each regional division, or it can base policy on the most RESTRICTIVE requirements to be consistent across the enterprise."
upvoted 4 times
...
koala_lay
1 year, 3 months ago
Selected Answer: A
In the scenario described, the overall security strategy should be based on: A. Risk assessment results. When expanding operations to a new country with stringent security laws, it is important to conduct a comprehensive risk assessment specific to the new environment. This assessment should identify and evaluate potential risks, vulnerabilities, and threats associated with the new office and its operations. By conducting a risk assessment, the organization can gain insights into the specific security challenges and requirements posed by the new country's security laws. It allows the organization to prioritize and address risks effectively, tailor security measures to the local context, and allocate resources appropriately.
upvoted 2 times
...
MacDanorld
1 year, 3 months ago
Selected Answer: A
I will go with A. Security strategy should be based on reducing risk to acceptable level and not regulatory compliance
upvoted 3 times
Thavee
9 months ago
the question said "stringent security laws"
upvoted 1 times
...
...
oluchecpoint
1 year, 4 months ago
Selected Answer: C
Option C
upvoted 1 times
...
Akam
1 year, 4 months ago
Selected Answer: A
The correct answer shall be A. I don't know how most people chose C? it's talking about overall strategy, if you create your strategy based on C, then you may end up with unnecessary spending or spending in areas which is not required, and this is not risk based decision making and will not support the business at all.
upvoted 3 times
Thavee
9 months ago
not overall strategy but the question said "stringent security laws", your business will be closed if not following the local security laws,
upvoted 1 times
...
Salilgen
10 months, 1 week ago
I agree
upvoted 1 times
...
...
[Removed]
1 year, 5 months ago
Selected Answer: A
The CISM Review Manual 27th Edition (Page 81) notes: "Risk identification is the first step in the risk assessment process. It determines what could cause potential harm... When performing risk identification, it is important to consider all relevant sources of risk, whether internal or external to the organization." CISM tries to get one main point to us. Our loyalty it first and foremost to the company. If the risk of not following the law is within their appetite and is generating more revenue than it would cost us for noncompliance, we don't care. A for sure imo.
upvoted 3 times
...
richck102
1 year, 6 months ago
C. the most stringent requirements.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago