Finance > QUESTIONS & ANSWERS > CISM - Information Security Governance, Strategy, Objectives & Metrics Exam with complete solution;  (All)

CISM - Information Security Governance, Strategy, Objectives & Metrics Exam with complete solution; Latest 2022

Document Content and Description Below

CISM - Information Security Governance, Strategy, Objectives & Metrics Exam with complete solution; Latest 2022 B is the correct answer. Justification The task of identifying business risk that... affects the organization is assigned and acted on after establishing the need for creating the program. In developing an information security management program, the first step is to establish the need for creating the program. This is a business decision based more on judgment than on any specific quantitative measures. The other choices are assigned and acted on after establishing the need. The task of assigning responsibility for the program is assigned and acted on after establishing the need for creating the program. The task of assessing the adequacy of existing controls is assigned and acted on after establishing the need for creating the program. - The FIRST step in developing an information security management program is to: identify business risk that affects the organization. establish the need for creating the program. assign responsibility for the program. assess adequacy of existing controls. B is the correct answer. Justification Centralized information security management is generally less expensive to administer due to the economies of scale. Centralization of information security management results in greater uniformity and better adherence to security policies. With centralized information security management, information security is typically less responsive to specific business unit needs. With centralized information security management, turnaround can be slower due to greater separation and more bureaucracy between the information security department and end users. - Which of the following is characteristic of centralized information security management? More expensive to administer Better adherence to policies More aligned with business unit needs Faster turnaround of requests C is the correct answer. Justification Uniformity in quality of service tends to vary from unit to unit. Adherence to policies is likely to vary considerably between various business units. Decentralization of information security management generally results in better alignment to business unit needs because security management is closer to the end user. Decentralization of information security management is generally more expensive to administer due to the lack of economies of scale. - Which of the following is characteristic of decentralized information security management across a geographically dispersed organization? More uniformity in quality of service Better adherence to policies Better alignment to business unit needs More savings in total operating costs C is the correct answer. Justification The number of employees has little or no effect on standard information security governance models. The distance between physical locations has little or no effect on standard information security governance models. Information security governance models are highly dependent on the overall organizational structure. Some of the elements that impact organizational structure are multiple missions and functions across the organization, leadership and lines of communication. Organizational budget may have some impact on suitable governance models depending on the one chosen because some models will be more costly to implement. - What will have the HIGHEST impact on standard information security governance models? [Show More]

Last updated: 2 years ago

Preview 1 out of 50 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Also available in bundle (1)

CISM Bundled Exams with complete solution

CISM 3131 - Final Exam / Test 3 Questions with Complete Solution CISM 4350: Final Exam 2022 with complete solution CISM 3330 Exam 2 Questions with Answers CISM Practice Exam 2 CISM Exam 3...

By Excel 2 years ago

$16

13  

Reviews( 0 )

$13.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

148
0

Document information


Connected school, study & course


About the document


Uploaded On

Sep 01, 2022

Number of pages

50

Written in

Seller


seller-icon
Excel

Member since 3 years

246 Documents Sold

Reviews Received
15
2
2
1
6
Additional information

This document has been written for:

Uploaded

Sep 01, 2022

Downloads

 0

Views

 148

Document Keyword Tags


$13.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·