Pretty sure B is what they're looking for. Digital signatures let the recipient check if the message was altered, but don't actually stop or fix tampering. D and C both miss that point. Let me know if you see it different.
Option D every time with ISACA, gets me how often folks overthink this. If you don’t have risk ownership documented, nobody’s accountable and nothing gets managed in practice.
I don’t think B is right here. D is most important since without risk ownership there’s no accountability and risks just sit unmanaged. Severity (B) is a trap since it helps with prioritizing, but doesn’t drive action by itself. Seen this asked in similar CISM sample questions-ISACA likes accountability focus.
Is anyone thinking data encryption (B) could be more of a blocker for investigations than odd log formats? I'm pretty sure C is right since if the logs aren't standardized, it's almost impossible to piece together what happened. But I get why D or B might confuse people.
Yeah, this comes down to whether the roadmap's already agreed on. If the roadmap is done, then D makes sense since you need a detailed project plan to start executing. But if exec consensus wasn’t secured, A could sneak in as the right move. Pretty sure on D unless the question’s hiding that detail somewhere.
Feels like D since you need to turn the high-level roadmap into a detailed project plan to start executing. Getting consensus or reviewing alignment would normally happen earlier during strategy and roadmap creation, not after. Pretty sure that's CISM best practice, but maybe there's a subtlety I'm missing. Agree?
I don't think it's B, since just supporting initiatives misses the point of why we use metrics. D fits better because CISM always stresses demonstrating effectiveness. B is tempting but feels like a distractor here.