Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 119 discussion

Actual exam question from ISC's CISSP
Question #: 119
Topic #: 1
[All CISSP Questions]

What is the FIRST step when developing an Information Security Continuous Monitoring (ISCM) program?

  • A. Collect the security-related information required for metrics, assessments, and reporting.
  • B. Establish an ISCM program determining metrics, status monitoring frequencies, and control assessment frequencies.
  • C. Define an ISCM strategy based on risk tolerance.
  • D. Establish an ISCM technical architecture.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
salimhajji
1 month, 1 week ago
page 23 of https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf
upvoted 1 times
...
salimhajji
1 month, 1 week ago
Logically, the next step after the development of the Information Security Continuous Monitoring (ISCM) program is Implement an ISCM program which consists of collecting the security-related information required for metrics, assessments, and reporting. Automate collection, analysis, and reporting of data wherever possible. So the answer must be:A. Collect the security-related information required for metrics, assessments, and reporting.
upvoted 1 times
...
YesPlease
11 months, 2 weeks ago
Selected Answer: C
Answer C) Define an ISCM strategy based on risk tolerance https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf
upvoted 2 times
...
Soleandheel
11 months, 3 weeks ago
C. Define an ISCM strategy based on risk tolerance. Strategy comes always before establishing a program.
upvoted 2 times
...
Bach1968
1 year, 4 months ago
Selected Answer: C
C. Define an ISCM strategy based on risk tolerance. When developing an Information Security Continuous Monitoring (ISCM) program, the first step is to define an ISCM strategy based on the organization's risk tolerance. This involves assessing the organization's risk appetite, understanding its security objectives, and determining the level of risk it is willing to accept.
upvoted 2 times
...
somkiatr
1 year, 10 months ago
Selected Answer: C
reference : NIST SP 800-137
upvoted 3 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
rajkamal0
1 year, 11 months ago
Selected Answer: C
Information Security Continuous Monitoring Reference Continuous monitoring can be a ubiquitous term as it means different things to different professions. NIST SP 800-137 sets forth a standard to follow when applying the principle in the risk management framework utilizing the NIST control set. The primary process for implementing ISCM is to: 1 - Define the ISCM strategy 2 - Establish an ISCM program 3 - Implement an ISCM program 4 - Analyze data and report findings 5 - Respond to findings 6 - Review and update the monitoring program and strategy Factored into this is the use of manual and automated checks to provide continuous updates and feedback to the system as a whole.
upvoted 4 times
...
Jamati
2 years ago
Selected Answer: C
You have to start with strategy
upvoted 2 times
...
Peterzhang
2 years, 1 month ago
C is correct which from the CISSP Cert guide 2022: According to NIST SP 800-137, ISCM is defined as maintaining ongoing awareness of information security, vulnerabilities, and threats to support organizational risk management decisions. Organizations should take the following steps to establish, implement, and maintain ISCM: 1. Define an ISCM strategy based on risk tolerance that maintains clear visibility into assets, awareness of vulnerabilities, up-to-date threat information, and mission/business impacts. 2. Establish an ISCM program that includes metrics, status monitoring frequencies, control assessment frequencies, and an ISCM technical architecture.
upvoted 3 times
...
IT_Guy23
2 years, 2 months ago
C is correct, the first step would be to define an ISCM strategy based on risk tolerance. B would be the second step.
upvoted 3 times
...
dev46
2 years, 2 months ago
I chose B but seems C includes B
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...