CISM Exam QuestionsBrowse all questions from this exam

CISM Exam - Question 693


Which of the following is MOST important to ensuring information stored by an organization is protected appropriately?

Show Answer
Correct Answer: AB

Assigning information asset ownership is the most important to ensuring information stored by an organization is protected appropriately. When information assets have clearly defined owners, they are accountable for implementing security measures, monitoring threats, and ensuring compliance with policies. This accountability fosters a sense of responsibility and promotes proactive management of information security risks. Clear ownership is crucial as it directly addresses fundamental responsibility, ensuring the information assets are effectively managed and protected according to organizational policies and requirements.

Discussion

17 comments
Sign in to comment
aokisanOption: B
Dec 24, 2022

data owner is important for assurance.

BoomersOption: A
Feb 6, 2023

A. Defining security asset categorization is the MOST important to ensuring information stored by an organization is protected appropriately. This involves classifying and prioritizing information assets based on their level of sensitivity and the impact to the organization in the event of a security breach. This helps to determine the appropriate level of protection needed for each asset and guides the development of security controls.

ats20
Mar 7, 2024

Agree with A - Assigning ownership is important aspects but it is typically built upon a foundation of well-defined security asset categorization.

Jae_kesOption: A
Jun 21, 2023

A. Defining security asset categorization

zero46Option: B
Jul 3, 2023

Asset owner will define asset category

oluchecpointOption: B
Sep 9, 2023

B. Assigning information asset ownership All of the options listed (A, B, C, and D) are important for ensuring that information stored by an organization is protected appropriately. However, if we had to prioritize them in terms of importance, it would typically be as follows: B > A > D > C

jennarink13Option: A
Jul 5, 2023

A. While ownership entails accountability, it doesn't mean that it is appropriately protected. For instance, misclassifying a sensitive information, although you have an owner, the level of protection is not appropriate since it is not properly classified.

richck102Option: B
Jul 7, 2023

B. Assigning information asset ownership

GoseuOption: A
Jul 17, 2023

A seems right .

KunzleOption: B
Sep 13, 2023

Assigning information asset ownership ensures that there is a designated individual or group responsible for the protection, use, and lifecycle management of specific information assets. The asset owner makes decisions about security controls based on the value and sensitivity of the information and is accountable for its protection. Having a clear ownership helps in effectively managing and protecting the asset according to organizational policies and requirements.

Marcovic00Option: A
Nov 21, 2023

If the asset has an owner but there is no criteria to calssify the data how would it help?

blehblehOption: A
Jan 3, 2024

I think the answer is A. You have to know how to protect something and classify it to meet the requirements of appropriate protection. Assigning an owner doesn't inherently set a standard for classification protection. Therefore you need to have criteria for classification to standardize protection.

AlexJacobsonOption: B
Jan 26, 2024

I'm gonna go with B here, because B does A.

REHAMAZZAMOption: B
Feb 8, 2024

B. Assigning information asset ownership Assigning information asset ownership is the most important aspect of ensuring that information stored by an organization is protected appropriately. When information assets have clearly defined owners, individuals or teams are accountable for their protection, including implementing security measures, monitoring for threats, and ensuring compliance with policies and regulations. This accountability fosters a sense of responsibility and promotes proactive management of information security risks. While options A, C, and D are also important components of an effective information security program, assigning ownership directly addresses the fundamental responsibility for protecting information assets.

SalilgenOption: A
Mar 8, 2024

Identify asset ownership (option B) is necessary to classify security asset but to ensuring information is protected appropriately occur that assets are categorized. Then B should be the FIRST and A is the MOST important thing

xcjxcjOption: B
Mar 11, 2024

A = label your computer as class A B = assign computer ownership to you B is better assurence

yottabyteOption: A
Mar 20, 2024

A seems to be correct, Asset categorization is required.

03allenOption: B
Jun 27, 2024

A is for effectiveness, B is the most important