nerdexam
IsacaIsaca

CISM · Question #809

CISM Question #809: Real Exam Question with Answer & Explanation

Sign in or unlock CISM to reveal the answer and full explanation for question #809. The question stem and answer options stay visible for context.

Submitted by daniela_cl· Apr 18, 2026Information Security Risk Management

Question

An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?

Options

  • AThe encryption keys are not provided to the vendor.
  • BIndependent audits of the vendor's operations are regularly conducted.
  • CThe vendor's controls are in line with the organization's security standards.
  • DThe vendor's data centers are in the same geographic region.

Unlock CISM to see the answer

You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Third-party risk management#Vendor assessment#Due diligence#Security controls alignment
Full CISM PracticeBrowse All CISM Questions