exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 160 discussion

Actual exam question from CompTIA's CS0-002
Question #: 160
Topic #: 1
[All CS0-002 Questions]

As part of the senior leadership team's ongoing risk management activities, the Chief Information Security Officer has tasked a security analyst with coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones. The management team wants to examine a new business process that would use existing infrastructure to process and store sensitive data. Which of the following would be appropriate for the security analyst to coordinate?

  • A. A black-box penetration testing engagement
  • B. A tabletop exercise
  • C. Threat modeling
  • D. A business impact analysis
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
amateurguy
Highly Voted 2 years, 9 months ago
Selected Answer: D
Go with D.
upvoted 8 times
...
Dany_Suarez
Highly Voted 2 years, 4 months ago
Selected Answer: B
Comptia guide says: Training and Exercises-Part of the risk management framework is ongoing monitoring to detect new sourcesof risk or changed risk probabilities or impacts. Security controls will, of course, betested by actual events, but it is best to be proactive and initiate training and exercises that test system security. Tabletop Exercises - A tabletop exercise is a facilitator-led training event where staff practice responses to a particular risk scenario. A BIA is carried out within the activities of a Business Continuity Management System (BCMS).
upvoted 6 times
...
RobV
Most Recent 1 year, 6 months ago
Selected Answer: B
B. A tabletop exercise Tabletop exercises are designed to simulate and evaluate an organization's response to a specific scenario, such as a security incident or a significant change in business processes. In this case, conducting a tabletop exercise would allow the senior leadership team and relevant personnel to discuss and test the response procedures, identify potential gaps in training or processes, and ensure that the team is adequately prepared to handle security challenges associated with the new business initiative. While threat modeling (Option C) is valuable for identifying potential threats and vulnerabilities, it may not directly address the training and testing aspects emphasized in the question. Tabletop exercises, on the other hand, specifically involve personnel in a simulated scenario, helping to assess their readiness and the effectiveness of existing procedures.
upvoted 1 times
...
Gwatto
1 year, 7 months ago
"respond to new business initiative or significant changes to existing ones." This is a tabletop exercise
upvoted 1 times
...
ElDirec
1 year, 8 months ago
Selected Answer: C
Remember this task was given to a security analyst, so he's most likely going to respond with a security analyst task, he's not a business analyst, so threat modeling, but they are close
upvoted 1 times
mdmdmd
1 year, 7 months ago
Why Threat modeling, I thought it is a process to identify and enumerate threats so that effective mitigations can be prioritized ,developed ,and implemented. Option D seems reasonable
upvoted 2 times
...
...
Chilaqui1es
1 year, 8 months ago
"Training and testing" I originally thought it was D but the more I think about it I am leaning towards B.
upvoted 1 times
...
skibby16
1 year, 8 months ago
Selected Answer: C
Threat modeling is a process that helps identify and analyze the potential threats and vulnerabilities of a system or process. It can help evaluate the security risks and mitigation strategies of a new business process that would use existing infrastructure to process and store sensitive data. A black-box penetration testing engagement, a tabletop exercise, or a business impact analysis are other methods that can be used to assess the security or resilience of a system or process, but they are not as appropriate as threat modeling for coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones. Reference: https://owasp.org/www-community/Application_Threat_Modeling
upvoted 1 times
...
kumax
1 year, 9 months ago
Selected Answer: D
ChatGPT: To respond to new business initiatives or significant changes to existing ones, particularly when dealing with sensitive data and infrastructure, the security analyst should coordinate a Security Impact Assessment (SIA) or a Security Assessment that includes the following components.
upvoted 1 times
ElDirec
1 year, 8 months ago
ChatGPT says Threat modeling now
upvoted 2 times
...
...
grelaman
1 year, 9 months ago
Selected Answer: C
Threat modeling evaluates threats and risks to information systems, identifies the likelihood that each threat will succeed and assesses the organization’s ability to respond to each identified threat. In this case, when considering a new business process involving sensitive data and existing infrastructure, threat modeling can help identify and address potential security threats and vulnerabilities before they become actual problems.
upvoted 2 times
grelaman
1 year, 9 months ago
Don't fotget that the CISO is involved in an ongioing risk management activites. Business impact analysis are related to the ability of the company to respond to disruptions (RTO/RPO/WRT/MTD)
upvoted 1 times
...
...
POWNED
1 year, 11 months ago
Selected Answer: B
"Chief Information Security Officer has tasked a security analyst with coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones." Key word here is training. Threat modeling has nothing to do with training. Your best answer here is B.
upvoted 1 times
...
kyky
2 years ago
Selected Answer: C
C. Threat modeling Threat modeling is a methodology used to identify and assess potential threats and vulnerabilities in a system or process. It helps in understanding the security risks associated with new business initiatives or significant changes to existing ones. By conducting threat modeling, the security analyst can evaluate the potential impact of processing and storing sensitive data using the existing infrastructure
upvoted 2 times
...
karpal
2 years ago
Selected Answer: B
key word is :"training and testing methodology" . I chose B
upvoted 2 times
...
khrid4
2 years, 3 months ago
Selected Answer: C
I'm changing my answer to C. Threat modeling, after seeing another question within this dump. Keyword is "new business initiatives/process". "Coordinating the right training and testing methodology" does not mean to act on testing and validation but more on "coordinating/planning" as I comprehend it.
upvoted 2 times
JoshuaXIV
2 years, 2 months ago
Threat modeling is a useful process in identifying potential threats.
upvoted 1 times
...
...
Al75diablo
2 years, 3 months ago
I am a MBCI and Disaster Recovery Specialist and the question is asking "tasked a security analyst with coordinating the right training and testing methodology to respond to new business initiatives or significant changes to existing ones." When conducting a BIA you look to identify system criticality, MTPD/RTO, Impact of loss, workarounds and dependencies. After the fact it identifies best possible strategies to implement as a Business Continuiy Plan ----- in this process there is no testing and training Table top exercise are done to walk through and new implementations or significant changes to the originations to identify if the controls put in place meet business objectives and are fit for purpose So answer should actually be B
upvoted 2 times
khrid4
2 years, 3 months ago
I agree with this, After thinking thoroughly, B suits the "testing methodology" than D.
upvoted 1 times
...
...
R00ted
2 years, 8 months ago
Selected Answer: D
The business impact analysis (BIA) is a formalized approach to risk prioritization that allows organizations to conduct their reviews in a structured manner. BIAs follow two different analysis methodologies:
upvoted 4 times
2Fish
2 years, 3 months ago
Agree.
upvoted 1 times
...
...
Cizzla7049
2 years, 9 months ago
Selected Answer: D
D is the answer
upvoted 4 times
...
Adrian831
2 years, 9 months ago
Selected Answer: D
For me it's D, table top exercise has other meaning.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...