New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 2 Question 3 Discussion

Actual exam question for Isaca's CISA exam
Question #: 3
Topic #: 2
[All CISA Questions]

Two organizations will share ownership of a new enterprise resource management (ERM) system To help ensure the successful implementation of the system, it k MOST important to

define:

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Essie
4 months ago
Surprised that governance is the top priority! Isn’t data access key?
upvoted 0 times
...
Devorah
4 months ago
Custody of assets? Really? That seems less relevant.
upvoted 0 times
...
Carissa
4 months ago
Procedures are important, but governance sets the tone.
upvoted 0 times
...
Velda
4 months ago
I think access to data is way more crucial.
upvoted 0 times
...
Linn
5 months ago
Definitely need to define the governance model first!
upvoted 0 times
...
Roxane
5 months ago
Custody of assets seems important, but I wonder if it’s really the top priority compared to governance and data access.
upvoted 0 times
...
Shay
5 months ago
I remember a practice question where access to data was emphasized, but I feel like governance might actually be more foundational for collaboration.
upvoted 0 times
...
Abel
5 months ago
I think defining the governance model is crucial since it sets the framework for decision-making, but I'm not entirely sure if it's the most important aspect.
upvoted 0 times
...
Edmond
5 months ago
I keep thinking about how appropriate procedures could impact the implementation, but I guess they might fall under the governance model too?
upvoted 0 times
...
Deangelo
5 months ago
Hmm, I'm a little confused by the wording here. Does "without building code" mean we can't use any custom code or automation at all? That seems tricky.
upvoted 0 times
...
Shawnda
5 months ago
Okay, I've got this. The key here is to limit the ability of the malware to move between systems on the network. Implementing 802.1X authentication would be my top choice since that would control access and prevent unauthorized lateral movement.
upvoted 0 times
...
Myong
5 months ago
I feel unsure about this; I thought we were taught that certain vulnerabilities are universally more critical. Maybe vulnerability #2 is always the highest?
upvoted 0 times
...
Elmira
5 months ago
I'm a little confused by this question. I know we need to keep the production environment up-to-date, but I'm not sure if deploying a new environment or requesting an update through a service request are the right approaches here. I'll have to think it through carefully.
upvoted 0 times
...
Catina
5 months ago
I'm not totally sure about this one. The relationships between all these elements seem complex, and I want to make sure I'm not missing any nuances. I'll have to think it through carefully.
upvoted 0 times
...

Save Cancel