Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 3 Question 74 Discussion

Actual exam question for Isaca's CISM exam
Question #: 74
Topic #: 3
[All CISM Questions]

Which of the following is MOST helpful in determining an organization's current capacity to mitigate risks?

Show Suggested Answer Hide Answer
Suggested Answer: C

Data encryption standards are the best information security initiative for creating an enterprise strategy for protecting data across multiple data repositories and different departments because they help to ensure the confidentiality, integrity, and availability of data in transit and at rest. Data encryption is a process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt it. Data encryption standards are the rules or specifications that define how data encryption should be performed, such as the type, strength, and mode of encryption, the key management and distribution methods, and the compliance requirements. Data encryption standards help to protect data from unauthorized access, modification, or theft, as well as to meet the regulatory obligations for data privacy and security. Therefore, data encryption standards are the correct answer.


https://www.techtarget.com/searchdatabackup/tip/20-keys-to-a-successful-enterprise-data-protection-strategy

https://cloudian.com/guides/data-protection/data-protection-strategy-10-components-of-an-effective-strategy/

https://www.veritas.com/information-center/enterprise-data-protection

Contribute your Thoughts:

Gerald
1 months ago
I'd just build a giant flamethrower to burn down the risks. Problem solved!
upvoted 0 times
Ernest
3 days ago
B: I agree, a vulnerability assessment would give us a better understanding of where our weaknesses are.
upvoted 0 times
...
Yuriko
13 days ago
A: That might not be the most effective solution. We should consider using a vulnerability assessment to determine our current capacity to mitigate risks.
upvoted 0 times
...
...
Cherry
1 months ago
Wait, which one lets me use the most buzzwords? I'm going with IT security risk and exposure - that's got to be the winner!
upvoted 0 times
...
Jesusa
2 months ago
Business impact analysis, for sure! That's where you really get to the heart of the organization's risk exposure.
upvoted 0 times
Sharee
4 days ago
Capability maturity model can also provide valuable insights into the organization's risk management capabilities.
upvoted 0 times
...
Tamesha
5 days ago
I think vulnerability assessment is also important to identify potential weaknesses.
upvoted 0 times
...
Evelynn
1 months ago
I agree, business impact analysis is crucial for understanding the risks.
upvoted 0 times
...
...
Maryann
2 months ago
I think the vulnerability assessment is the way to go. Gotta know where the weaknesses are before you can start mitigating, right?
upvoted 0 times
Verdell
5 days ago
Definitely, vulnerability assessment is crucial for identifying weaknesses.
upvoted 0 times
...
Ailene
6 days ago
I agree, knowing the vulnerabilities is key to improving security.
upvoted 0 times
...
Skye
7 days ago
D) Business impact analysis (BIA)
upvoted 0 times
...
Dacia
8 days ago
C) IT security risk and exposure
upvoted 0 times
...
Ryan
10 days ago
B) Vulnerability assessment
upvoted 0 times
...
Nicolette
13 days ago
A) Capability maturity model
upvoted 0 times
...
...
Ligia
2 months ago
Hmm, a capability maturity model sounds like the right approach to me. It's all about assessing the organization's overall security posture, isn't it?
upvoted 0 times
Aron
10 days ago
That's also important to consider when determining risk mitigation strategies.
upvoted 0 times
...
Kenneth
14 days ago
C) IT security risk and exposure
upvoted 0 times
...
Chanel
19 days ago
Yes, the capability maturity model helps assess the organization's security readiness.
upvoted 0 times
...
Ulysses
22 days ago
A) Capability maturity model
upvoted 0 times
...
...
Olive
2 months ago
That's a good point, but I still think IT security risk and exposure gives a more comprehensive view of the organization's risk posture.
upvoted 0 times
...
Daniel
2 months ago
I disagree, I believe vulnerability assessment is more important because it helps identify weaknesses that can be exploited by attackers.
upvoted 0 times
...
Olive
3 months ago
I think the most helpful in determining an organization's current capacity to mitigate risks is IT security risk and exposure.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77