Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 5 Question 73 Discussion

Actual exam question for Isaca's CISM exam
Question #: 73
Topic #: 5
[All CISM Questions]

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Show Suggested Answer Hide Answer
Suggested Answer: D

The most effective course of action when employees are using free cloud storage services to store company data through their mobile devices is to assess the business need to provide a secure solution, such as a corporate-approved cloud service or a virtual desktop environment. Assessing the business need can help understand why employees are using free cloud storage services, what kind of data they are storing, and what are the security risks and requirements. Based on the assessment, the security manager can propose a secure solution that meets the business needs and complies with the BYOD policy. The other options, such as allowing the practice to continue, disabling remote access, or initiating remote wipe, may not address the underlying business need or may cause disruption or data loss. Reference:

https://www.digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach

https://news.microsoft.com/en-xm/2021/03/18/how-to-have-secure-remote-working-with-a-byod-policy/

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/-infosec-guide-bring-your-own-device-byod


Contribute your Thoughts:

Caitlin
5 hours ago
Periodic audits are a good start, but I think a clear cybersecurity policy is key to effectively managing emerging risks.
upvoted 0 times
...
Kyoko
14 days ago
I believe periodic internal and external audits are also important to manage cyber risk effectively.
upvoted 0 times
...
Dana
15 days ago
I agree with Huey, having clear lines of responsibility ensures accountability.
upvoted 0 times
...
Huey
25 days ago
I think clear lines of responsibility are crucial for managing cyber risk.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77