Users Online
· Guests Online: 50
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
· Members Online: 0
· Total Members: 188
· Newest Member: meenachowdary055
Forum Threads
Newest Threads
No Threads created
Hottest Threads
No Threads created
Latest Articles
Articles Hierarchy
Isaca- CISA
Question ID 22455 |
Which of the following is a mechanism for mitigating risks? |
Option A |
Security and control practices |
Option B |
Property and liability insurance |
Option C |
Audit and certification |
Option D |
Contracts and service level agreements (SLAs) |
Correct Answer | A |
Update Date and Time 2018-03-30 05:13:34
Question ID 22456 |
When developing a risk management program, what is the FIRST activity to be performed? |
Option A |
Threat assessment |
Option B |
Classification of data |
Option C |
Inventory of assets |
Option D |
Criticality analysis |
Correct Answer | C |
Description Identification of the assets to be protected is the first step in the development of a risk management program. A listing of the threats that can affect the performance of these assets and criticality analysis are later steps in the process. Data classification is required for defining access controls and in criticality analysis.
Update Date and Time 2018-03-30 05:14:21
Comments
No Comments have been Posted.
Post Comment
Please Login to Post a Comment.