New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 5 Question 73 Discussion

Actual exam question for Isaca's CISM exam
Question #: 73
Topic #: 5
[All CISM Questions]

Which of the following BEST enables an organization to effectively manage emerging cyber risk?

Show Suggested Answer Hide Answer
Suggested Answer: D

The most effective course of action when employees are using free cloud storage services to store company data through their mobile devices is to assess the business need to provide a secure solution, such as a corporate-approved cloud service or a virtual desktop environment. Assessing the business need can help understand why employees are using free cloud storage services, what kind of data they are storing, and what are the security risks and requirements. Based on the assessment, the security manager can propose a secure solution that meets the business needs and complies with the BYOD policy. The other options, such as allowing the practice to continue, disabling remote access, or initiating remote wipe, may not address the underlying business need or may cause disruption or data loss. Reference:

https://www.digitalguardian.com/blog/byod-security-expert-tips-policy-mitigating-risks-preventing-breach

https://news.microsoft.com/en-xm/2021/03/18/how-to-have-secure-remote-working-with-a-byod-policy/

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/-infosec-guide-bring-your-own-device-byod


Contribute your Thoughts:

0/2000 characters
Annelle
3 months ago
Wait, are audits really that effective?
upvoted 0 times
...
Sherly
3 months ago
A solid budget is crucial too!
upvoted 0 times
...
Kati
3 months ago
Cybersecurity policies are a must-have!
upvoted 0 times
...
Lorrine
4 months ago
I’m not so sure about that. What about audits?
upvoted 0 times
...
Mari
4 months ago
Clear lines of responsibility are key!
upvoted 0 times
...
Caprice
4 months ago
Cybersecurity policies seem fundamental, but I wonder if they are enough on their own without the other factors in place.
upvoted 0 times
...
Wynell
4 months ago
I feel like having a sufficient budget is necessary, but I can't recall if it directly correlates with managing emerging risks effectively.
upvoted 0 times
...
Michael
4 months ago
I remember a practice question that emphasized clear lines of responsibility; it seems crucial for accountability in cybersecurity.
upvoted 0 times
...
Charisse
5 months ago
I think periodic audits are important, but I'm not sure if they are the best option for managing emerging risks.
upvoted 0 times
...
Tammara
5 months ago
I'm feeling a bit unsure about this question. I'll need to weigh the pros and cons of each option to make the right choice.
upvoted 0 times
...
Lai
5 months ago
Okay, I've got this. Periodic audits, clear responsibilities, sufficient budget, and cybersecurity policies - I think option D is the best answer here.
upvoted 0 times
...
Christiane
5 months ago
Hmm, I'm not entirely sure about this. I'll need to review my notes on cyber risk management to decide.
upvoted 0 times
...
Tracey
5 months ago
This is a tricky one. I'll need to think through the options carefully to determine the best approach.
upvoted 0 times
...
Stephania
5 months ago
Hmm, I'm a bit unsure about the differences between Administration Server and Managed Server. Let me think this through carefully.
upvoted 0 times
...
Harley
5 months ago
Okay, I see what's going on here. Service A is using its private key to encrypt the message digest, which Service B can then decrypt with the public key. This proves the message came from Service A and wasn't altered in transit. I'm confident I can select the right answer.
upvoted 0 times
...
Artie
5 months ago
I'm pretty sure this is punishment. When an employee gets demoted, it's a direct negative consequence for poor performance.
upvoted 0 times
...
Ma
9 months ago
Definitely going with the cybersecurity policies option. That's the foundation for everything else - setting the rules of the road for managing cyber risks.
upvoted 0 times
Elise
8 months ago
True, everyone needs to know their role in protecting against cyber attacks.
upvoted 0 times
...
Isaiah
9 months ago
Having clear lines of responsibility is also important to ensure accountability.
upvoted 0 times
...
Kandis
9 months ago
I agree, they provide the guidelines for how to handle potential threats.
upvoted 0 times
...
Bobbie
9 months ago
Cybersecurity policies are definitely crucial for managing cyber risks.
upvoted 0 times
...
...
Glynda
9 months ago
Ha! Cybersecurity on a budget, that's a joke. But you know what they say, an ounce of prevention is worth a pound of 'I told you so'.
upvoted 0 times
...
Dorothy
10 months ago
I agree, a holistic approach with policies, budget, and clear roles is needed. This question is testing our understanding of a comprehensive cybersecurity strategy.
upvoted 0 times
Micheal
8 months ago
C) Sufficient cyber budget allocation
upvoted 0 times
...
Sherill
8 months ago
B) Clear lines of responsibility
upvoted 0 times
...
Vincenza
9 months ago
A) Periodic internal and external audits
upvoted 0 times
...
...
Sharen
10 months ago
Budget allocation is important, but without defined responsibilities, it's like throwing money at a problem without a plan.
upvoted 0 times
Sabra
9 months ago
C) Sufficient cyber budget allocation
upvoted 0 times
...
Quiana
9 months ago
B) Clear lines of responsibility
upvoted 0 times
...
Tammara
10 months ago
A) Periodic internal and external audits
upvoted 0 times
...
...
Caitlin
10 months ago
Periodic audits are a good start, but I think a clear cybersecurity policy is key to effectively managing emerging risks.
upvoted 0 times
...
Kyoko
11 months ago
I believe periodic internal and external audits are also important to manage cyber risk effectively.
upvoted 0 times
...
Dana
11 months ago
I agree with Huey, having clear lines of responsibility ensures accountability.
upvoted 0 times
...
Huey
11 months ago
I think clear lines of responsibility are crucial for managing cyber risk.
upvoted 0 times
...

Save Cancel