IsacaIsaca
CISM · Question #809
CISM Question #809: Real Exam Question with Answer & Explanation
Sign in or unlock CISM to reveal the answer and full explanation for question #809. The question stem and answer options stay visible for context.
Submitted by daniela_cl· Apr 18, 2026Information Security Risk Management
Question
An organization is considering using a third party to host sensitive archived data. Which of the following is MOST important to verify before entering into the relationship?
Options
- AThe encryption keys are not provided to the vendor.
- BIndependent audits of the vendor's operations are regularly conducted.
- CThe vendor's controls are in line with the organization's security standards.
- DThe vendor's data centers are in the same geographic region.
Unlock CISM to see the answer
You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Third-party risk management#Vendor assessment#Due diligence#Security controls alignment