Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 5 Question 73 Discussion

Actual exam question for Isaca's CISM exam
Question #: 73
Topic #: 5
[All CISM Questions]

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Show Suggested Answer Hide Answer
Suggested Answer: D

The most effective course of action when employees are using free cloud storage services to store company data through their mobile devices is to assess the business need to provide a secure solution, such as a corporate-approved cloud service or a virtual desktop environment. Assessing the business need can help understand why employees are using free cloud storage services, what kind of data they are storing, and what are the security risks and requirements. Based on the assessment, the security manager can propose a secure solution that meets the business needs and complies with the BYOD policy. The other options, such as allowing the practice to continue, disabling remote access, or initiating remote wipe, may not address the underlying business need or may cause disruption or data loss. Reference:

https://www.digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach

https://news.microsoft.com/en-xm/2021/03/18/how-to-have-secure-remote-working-with-a-byod-policy/

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/-infosec-guide-bring-your-own-device-byod


Contribute your Thoughts:

Ma
1 months ago
Definitely going with the cybersecurity policies option. That's the foundation for everything else - setting the rules of the road for managing cyber risks.
upvoted 0 times
Elise
4 days ago
True, everyone needs to know their role in protecting against cyber attacks.
upvoted 0 times
...
Isaiah
14 days ago
Having clear lines of responsibility is also important to ensure accountability.
upvoted 0 times
...
Kandis
16 days ago
I agree, they provide the guidelines for how to handle potential threats.
upvoted 0 times
...
Bobbie
22 days ago
Cybersecurity policies are definitely crucial for managing cyber risks.
upvoted 0 times
...
...
Glynda
1 months ago
Ha! Cybersecurity on a budget, that's a joke. But you know what they say, an ounce of prevention is worth a pound of 'I told you so'.
upvoted 0 times
...
Dorothy
1 months ago
I agree, a holistic approach with policies, budget, and clear roles is needed. This question is testing our understanding of a comprehensive cybersecurity strategy.
upvoted 0 times
Micheal
4 days ago
C) Sufficient cyber budget allocation
upvoted 0 times
...
Sherill
10 days ago
B) Clear lines of responsibility
upvoted 0 times
...
Vincenza
14 days ago
A) Periodic internal and external audits
upvoted 0 times
...
...
Sharen
2 months ago
Budget allocation is important, but without defined responsibilities, it's like throwing money at a problem without a plan.
upvoted 0 times
Sabra
13 days ago
C) Sufficient cyber budget allocation
upvoted 0 times
...
Quiana
1 months ago
B) Clear lines of responsibility
upvoted 0 times
...
Tammara
1 months ago
A) Periodic internal and external audits
upvoted 0 times
...
...
Caitlin
2 months ago
Periodic audits are a good start, but I think a clear cybersecurity policy is key to effectively managing emerging risks.
upvoted 0 times
...
Kyoko
2 months ago
I believe periodic internal and external audits are also important to manage cyber risk effectively.
upvoted 0 times
...
Dana
2 months ago
I agree with Huey, having clear lines of responsibility ensures accountability.
upvoted 0 times
...
Huey
3 months ago
I think clear lines of responsibility are crucial for managing cyber risk.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77