nerdexam
IsacaIsaca

CISM · Question #869

CISM Question #869: Real Exam Question with Answer & Explanation

Sign in or unlock CISM to reveal the answer and full explanation for question #869. The question stem and answer options stay visible for context.

Submitted by skyler.x· Apr 18, 2026Information Security Risk Management

Question

Which of the following should occur FIRST in the process of managing security risk associated with the transfer of data from unsupported legacy systems to supported systems?

Options

  • AAssign owners to be responsible for the transfer of each asset.
  • BConduct a business impact analysis (BIA).
  • CPerform security testing on legacy systems.
  • DIdentity all information assets in the legacy environment.

Unlock CISM to see the answer

You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Risk Management Process#Asset Identification#Data Security#Legacy Systems
Full CISM PracticeBrowse All CISM Questions