New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 1 Question 55 Discussion

Actual exam question for Isaca's CISM exam
Question #: 55
Topic #: 1
[All CISM Questions]

Which of the following is the BEST indication of information security strategy alignment with the ''&

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Jina
4 months ago
SLAs (A) are crucial for measuring effectiveness, though.
upvoted 0 times
...
Vernell
4 months ago
Really? I’m surprised that attendance (C) isn’t more significant.
upvoted 0 times
...
Melvin
4 months ago
But isn't option B important too? More budget means more security!
upvoted 0 times
...
Felton
4 months ago
Totally agree with D! Alignment is key!
upvoted 0 times
...
Dan
4 months ago
I think option D is the best choice. It shows direct support for business goals.
upvoted 0 times
...
Darci
5 months ago
I recall discussing the importance of awareness sessions, but I’m not convinced that just counting attendees (option C) really measures alignment either.
upvoted 0 times
...
Karan
5 months ago
I’m leaning towards option B because budget allocation shows commitment, but I wonder if it really indicates effective alignment.
upvoted 0 times
...
Eun
5 months ago
I remember practicing a question about SLAs, and while they’re important, I feel like they don’t fully reflect alignment with business goals.
upvoted 0 times
...
Cristal
5 months ago
I think option D might be the best choice since it directly ties security initiatives to business objectives, but I'm not entirely sure.
upvoted 0 times
...
Cordelia
5 months ago
I'm a bit confused by the wording of the question. The options seem to cover similar concepts, but I'm not sure how to differentiate them. I'll have to think about this one a bit more.
upvoted 0 times
...
Nicholle
5 months ago
Okay, let me break this down step-by-step. We need to enable BIDIR-PIM under global configuration mode, so the command is likely to start with "ip pim". I'll eliminate the other options and go with A.
upvoted 0 times
...
Jina
5 months ago
This looks like a complex scenario with a lot of moving parts. I'll need to carefully read through all the details to understand the key issues and stakeholders before deciding on the most important benefit to include in the business case.
upvoted 0 times
...
Emerson
5 months ago
Okay, let's see. The question is asking about modifying IPSec policies, so I'll need to focus on that and the options provided.
upvoted 0 times
...

Save Cancel