New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 3 Question 92 Discussion

Actual exam question for Isaca's CISM exam
Question #: 92
Topic #: 3
[All CISM Questions]

Which of the following would be MOST important to include in a proposal justifying investments for an organization's information security program?

Show Suggested Answer Hide Answer
Suggested Answer: D

Comprehensive and Detailed Step-by-Step Explanation:

Justifying investments in information security requires aligning proposals with business objectives to gain management approval.

A . Vulnerability scan results: These provide technical insights but are insufficient for high-level justification.

B . Competitor benchmark analysis: While useful, this is less relevant than demonstrating direct alignment with organizational needs.

C . Previous security budget: Historical data may provide context but does not justify future needs.

D . Business requirements: This is the BEST answer because aligning security investments with business objectives demonstrates the value and necessity of the program to stakeholders.


Contribute your Thoughts:

0/2000 characters
Toshia
3 months ago
I agree, business requirements should lead the way!
upvoted 0 times
...
Shonda
3 months ago
Surprised that competitor analysis isn't a top choice!
upvoted 0 times
...
Merilyn
3 months ago
Previous security budget? Not really relevant anymore.
upvoted 0 times
...
Corazon
4 months ago
I think business requirements are way more important.
upvoted 0 times
...
Margot
4 months ago
Definitely need those vulnerability scan results!
upvoted 0 times
...
Alona
4 months ago
Competitor benchmark analysis could be useful, but I feel like it’s more about understanding the market rather than justifying specific investments.
upvoted 0 times
...
Eve
4 months ago
I remember a practice question where previous security budgets were mentioned, but I feel like they might not be as relevant as business requirements in this case.
upvoted 0 times
...
Dino
4 months ago
I'm not sure if vulnerability scan results are the most important. They show current issues, but do they really justify the investment?
upvoted 0 times
...
Galen
5 months ago
I think business requirements are crucial because they align security investments with organizational goals, right?
upvoted 0 times
...
Nancey
5 months ago
Business requirements are definitely key. You need to tie the security investments back to how they'll enable the organization to achieve its objectives.
upvoted 0 times
...
Alpha
5 months ago
I think the competitor benchmark analysis would be a good way to show how the organization's security measures stack up against the industry. That could help make a strong case.
upvoted 0 times
...
Freeman
5 months ago
Hmm, I'm not sure. The vulnerability scan results could be really important to justify the need for security improvements. I'll have to think about this one.
upvoted 0 times
...
Huey
5 months ago
This seems straightforward - I'd focus on the business requirements and how the security investments will support the organization's goals.
upvoted 0 times
...
Tonette
1 year ago
D) Business requirements, for sure. Can't protect what you don't understand. Although, maybe throw in some cat pics to really seal the deal. Security folks love cats, right?
upvoted 0 times
Howard
11 months ago
D) Business requirements
upvoted 0 times
...
Lajuana
12 months ago
A) Vulnerability scan results
upvoted 0 times
...
...
Beth
1 year ago
I'm going with B) Competitor benchmark analysis. Gotta stay ahead of the competition, even in security!
upvoted 0 times
...
Peggie
1 year ago
I still think business requirements should take precedence, as they align the security investments with the organization's goals.
upvoted 0 times
...
Howard
1 year ago
That's a good point, Vicky. Vulnerability scan results can demonstrate the current risks and vulnerabilities.
upvoted 0 times
...
Kandis
1 year ago
I'd say A) Vulnerability scan results. Showing the actual risks you're facing is key to justifying the investment.
upvoted 0 times
...
Vicky
1 year ago
But wouldn't vulnerability scan results also be important to show the need for investment in security?
upvoted 0 times
...
Peggie
1 year ago
I agree with Howard, business requirements are crucial for justifying investments.
upvoted 0 times
...
Vanna
1 year ago
Definitely D) Business requirements. That's the foundation for any security program. Gotta know what you're protecting, right?
upvoted 0 times
Leanora
11 months ago
Definitely D) Business requirements. That's the foundation for any security program. Gotta know what you're protecting, right?
upvoted 0 times
...
Jani
12 months ago
D) Business requirements
upvoted 0 times
...
Yan
12 months ago
C) Previous security budget
upvoted 0 times
...
Kattie
12 months ago
B) Competitor benchmark analysis
upvoted 0 times
...
Salena
12 months ago
A) Vulnerability scan results
upvoted 0 times
...
...
Howard
1 year ago
I think the most important thing to include would be business requirements.
upvoted 0 times
...

Save Cancel