nerdexam
IsacaIsaca

CISM · Question #130

CISM Question #130: Real Exam Question with Answer & Explanation

Sign in or unlock CISM to reveal the answer and full explanation for question #130. The question stem and answer options stay visible for context.

Submitted by rachelw· Apr 18, 2026Information Security Program Development and Management

Question

Which of the following is the BEST approach for data owners to use when defining access privileges for users?

Options

  • AImplement an identity and access management (IDM) tool.
  • BAdopt user account settings recommended by the vendor.
  • CPerform a risk assessment of the users' access privileges.
  • DDefine access privileges based on user roles.

Unlock CISM to see the answer

You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Access Control#Role-Based Access Control (RBAC)#Data Ownership#Privilege Management
Full CISM PracticeBrowse All CISM Questions