exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 127 discussion

Actual exam question from CompTIA's CS0-002
Question #: 127
Topic #: 1
[All CS0-002 Questions]

A company has started planning the implementation of a vulnerability management procedure. However, its security maturity level is low. So there are some prerequisites to complete before risk calculation and prioritization.
Which of the following should be completed FIRST?

  • A. A business impact analysis
  • B. A system assessment
  • C. Communication of the risk factors
  • D. A risk identification process
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Whoah
Highly Voted 2 years, 7 months ago
Selected Answer: B
Step 1. Assess Step 2. Prioritize Step 3. Act Step 4. Reassess Step 5. Improve
upvoted 18 times
...
khrid4
Highly Voted 2 years, 3 months ago
Selected Answer: D
Before risk calculation and prioritization, a risk "identification" process should first be created, given that the security level is low, it is possible that the company doesn't have this in the first place. I. Once the process is established, the process may include the conducting of a system assessment or other means as part of the identification. As per COMPTIA Cysa Official Study Guide: Under Risk Identification Process (NIST SP 800-39): Assess, Respond, Monitor, Frame.
upvoted 10 times
Dutch012
2 years ago
Logic!, I 100% agree
upvoted 1 times
...
Xoomalla
1 year, 10 months ago
The option "D. A risk identification process" refers to the process of recognizing potential threats and vulnerabilities that could negatively impact an organization. While it's a crucial part of risk management, risk identification is somewhat ahead of the game if the organization's security maturity level is low.
upvoted 1 times
Xoomalla
1 year, 10 months ago
CHATGPT, and it make sense...
upvoted 1 times
...
...
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: D
D. A risk identification process Before conducting a business impact analysis, system assessment, or communication of risk factors, it's crucial to identify and understand the risks associated with the systems and processes in the organization. The risk identification process helps in identifying potential vulnerabilities, threats, and weaknesses that may exist in the current environment. Once risks are identified, the organization can then proceed to assess their impact on the business (business impact analysis), evaluate the current state of systems (system assessment), and communicate the relevant risk factors.
upvoted 1 times
...
naleenh
1 year, 10 months ago
Selected Answer: D
In the context of implementing a vulnerability management procedure, the first step should be to identify and assess the risks associated with the organization's systems and assets.
upvoted 1 times
...
Nixon333
1 year, 11 months ago
Its B.A system assessment is the foundational step in vulnerability management. Before calculating and prioritizing risks, it is essential to have a comprehensive understanding of the organization's systems, assets, and their associated vulnerabilities. D. A risk identification process is part of the vulnerability management procedure, but it comes after the system assessment.
upvoted 2 times
...
Sleezyglizzy
1 year, 11 months ago
D It has to be identified first, look it up.
upvoted 1 times
...
kiduuu
2 years, 2 months ago
Selected Answer: D
Since the security maturity level of the company is low, it is important to complete some prerequisites before risk calculation and prioritization. The first step should be to identify the risks that the organization is facing. Therefore, option D, which suggests completing a risk identification process, should be completed first. Once the risks have been identified, the organization can then move on to perform a system assessment to understand the current state of their security posture. After that, they can conduct a business impact analysis to understand the potential impact of these risks on their business operations. Finally, the organization can communicate the risk factors to the relevant stakeholders to ensure that everyone is aware of the potential risks
upvoted 2 times
...
2Fish
2 years, 3 months ago
Selected Answer: B
B. A system assessment will typically involve identifying risks. This is a funky question because I can see B or D being ok. But I would lean towards an assessment FIRST.
upvoted 2 times
2Fish
2 years, 3 months ago
Hmmm ..khrid makes a good point.. This could very well be D.
upvoted 1 times
...
i_Alfie
1 year, 7 months ago
Why not A?
upvoted 1 times
...
...
AaronS1990
2 years, 4 months ago
"prerequisites to complete before risk calculation and prioritization" This steers me to risk identification being the most feasible, though I think a few of these answers make sense
upvoted 1 times
...
Cock
2 years, 4 months ago
A. A business impact analysis should be completed first. Before starting the implementation of a vulnerability management procedure, it is important to understand the potential impact of a security breach on the company's operations, reputation, and finances. A business impact analysis can help identify critical systems, data, and processes and determine the consequences of a security breach on these areas. This information is crucial in determining the priority and resources needed for the vulnerability management process.
upvoted 2 times
i_Alfie
1 year, 7 months ago
i agree. you do BIA first before anything else especially your maturity level is low
upvoted 1 times
...
...
CatoFong
2 years, 4 months ago
Selected Answer: B
assess your systems so you know what vulnerabilities you are potentially managing
upvoted 3 times
...
Stiobhan
2 years, 4 months ago
Selected Answer: D
I am going to go with D. My rational is a system assessment would be part of the risk identification process - https://www.cyberwatching.eu/cyber-risk-identification#:~:text=As%20mentioned%20in%20the%20section%20on%20the%20cyber,Decide%20what%20to%20do%20about%20the%20residual%20risk
upvoted 2 times
...
absabs
2 years, 4 months ago
"to complete before risk calculation and prioritization." --> before risk calculation, we must check system. We dont assess system that we dont know about
upvoted 1 times
...
MrRobotJ
2 years, 7 months ago
Selected Answer: B
The question literally says " risk calculation and prioritization."
upvoted 1 times
MrRobotJ
2 years, 7 months ago
"before risk calculation and prioritization"
upvoted 3 times
...
...
Cizzla7049
2 years, 7 months ago
Selected Answer: B
assess the system to know what all you're protecting
upvoted 2 times
...
amateurguy
2 years, 9 months ago
Selected Answer: D
D is the most reasonable first choice.
upvoted 3 times
...
Laudy
2 years, 10 months ago
agreed D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...