exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 38 discussion

Actual exam question from ISC's CISSP
Question #: 38
Topic #: 1
[All CISSP Questions]

Which of the following is MOST important to follow when developing information security controls for an organization?

  • A. Use industry standard best practices for security controls in the organization.
  • B. Exercise due diligence with regard to all risk management information to tailor appropriate controls.
  • C. Review all local and international standards and choose the most stringent based on location.
  • D. Perform a risk assessment and choose a standard that addresses existing gaps.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
JAckThePip
Highly Voted 2 years, 4 months ago
Answer is D "To assess risk, you need to think about threats and vulnerabilities. Start by making a list of any potential threats to your organization’s assets, then score these threats based on their likelihood and impact. From there, think about what vulnerabilities exist within your organization, categorize and rank them based on potential impact. These vulnerabilities can consist of people (employees, clients, third parties), processes or lack thereof, and technologies in place. " https://www.barradvisory.com/roadmap-to-implementing-a-successful-information-security-program/
upvoted 9 times
jackdryan
1 year, 10 months ago
B is correct
upvoted 3 times
...
...
Loveguitar
Highly Voted 2 years, 5 months ago
Performing risk assessment covers answer C, for example, if you need to be PCI DSS compliant, you first assess the risk in your environment and compare it with what the standard says, your ISA can help you do that before the external assessor (QSA) comes in and assesses your controls (again the PCI DSS standard) to see your gaps.
upvoted 6 times
...
Fouad777
Most Recent 2 months ago
Selected Answer: B
B. Exercise due diligence with regard to all risk management information to tailor appropriate controls. When developing information security controls, due diligence ensures that the chosen controls are appropriate and effective based on the specific risks and needs of the organization. By considering all risk management information—such as the organization's risk profile, potential threats, vulnerabilities, and the impact of a security breach—security controls can be tailored to address the unique risks the organization faces. This approach helps ensure that the controls are both effective and proportionate to the risks.
upvoted 1 times
...
somsom
4 months, 1 week ago
The answer is obviously D, risk assessment, gap analysis ( Full, partial and non-compliance with ISO Controls) the implementation of Security controls in compliance with ISO 27001
upvoted 1 times
...
celomomo
4 months, 3 weeks ago
Selected Answer: D
Starting point is always review the existing plan and identify gaps. Also the same in ITIL v4. D
upvoted 1 times
...
adc9365
6 months ago
Selected Answer: D
Risk assessment is most important to event start to know which controls are needed then you determine the rules and regulations.
upvoted 1 times
...
JohnBentass
8 months, 1 week ago
Selected Answer: B
B. Exercise due diligence with regard to all risk management information to tailor appropriate controls. This approach ensures that the security controls are specifically tailored to the unique risks and needs of the organization. By exercising due diligence, you can identify and assess the specific threats and vulnerabilities that the organization faces, and implement controls that are most effective in mitigating those risks. This method aligns with best practices in risk management and ensures that resources are allocated efficiently to address the most critical security concerns.
upvoted 1 times
...
1ee7bdb
10 months ago
D is the answer
upvoted 1 times
...
Hardrvkllr
10 months, 2 weeks ago
B: Always need to do your "Due Diligence, and Due Care." While a stringent policy and rules need to be in place, you need to remember, when implementing said controls, they need to be within reach in order to make it an effective control. Due diligence should cover the expectation of cover the local and international standards. It "SHOULD" be implied that it is being looked into, or has been looked into.
upvoted 1 times
...
AshStevens
10 months, 3 weeks ago
Selected Answer: D
D. You need to know what you are doing before you can implement A. Due dilligence means nothing if you picked the wrong thing and don't know what you are doing it for. C is partly covered by D and you may not even want the "most stringent" depending on your organisation. Think like a manager!
upvoted 2 times
...
homeysl
11 months, 2 weeks ago
Selected Answer: D
You need to identify the risk to make an informed decision
upvoted 1 times
...
Vaneck
11 months, 2 weeks ago
Selected Answer: D
The most important option to follow when developing information security controls for an organization is D. Perform a risk assessment and choose a standard that addresses existing gaps. This ensures that security controls are specifically tailored to the organization's needs and vulnerabilities, providing more effective protection against identified threats.
upvoted 2 times
...
oksey
1 year, 6 months ago
Selected Answer: C
Choose the most stringent
upvoted 2 times
...
Bach1968
1 year, 7 months ago
Selected Answer: C
Considering legislation and legal requirements is an important aspect for a company to prioritize. Option C: Review all local and international standards and choose the most stringent based on location highlights the significance of being aware of and complying with relevant laws and regulations.
upvoted 2 times
...
KelvinYau
1 year, 8 months ago
Selected Answer: B
I think B
upvoted 1 times
...
FlimFlam
1 year, 11 months ago
B is the best answer. Exercising due diligence will require you to perform a risk assessment and then you will take all risk information into account. B is the all encompassing answer making it the best answer.
upvoted 3 times
...
Dee83
2 years, 1 month ago
D. Perform a risk assessment and choose a standard that addresses existing gaps is the MOST important when developing information security controls for an organization. A risk assessment is a critical step in the process of identifying, evaluating, and prioritizing the risks associated with an organization's information systems, assets, and processes. By performing a risk assessment, the organization can identify vulnerabilities and threats, and determine the likelihood and impact of potential security incidents. Based on the results of the risk assessment, the organization can then implement appropriate controls to mitigate or prevent identified risks, such as choosing a standard that addresses existing gaps in the organization's security posture.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago