Answer: A
option A focuses specifically on evaluating the potential consequences or impact of identified risks. This assessment helps management understand the severity of each risk scenario, enabling them to prioritize mitigation efforts and allocate resources accordingly
option C alone does not provide management with specific information on how to mitigate risks.
I think its.. C.
Identify the owner and custody of the asset.
Identify and list information systems assets of the organization. (List all interfacing applications, people, hardware or other containers for each asset.)
Containers are the place where an information asset or data “lives” or any type of information asset (data) is stored transported or processed.3
Identify the security objectives of confidentiality, integrity and availability (CIA) and a weighting of the asset to conduct an impact assessment based upon the criticality of the asset to the operation of the company.
Identify the asset’s security categories and its estimated value.
Determine the threat and vulnerability’s quantitative value and rates.
Estimate the probability of occurrence/likelihood of impact.
Identify existing controls and perform a gap analysis
Risk Classification is not as obvious for people outside the Risk management system than Impact, which represent potential scenarios
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
a84n
7Â months, 4Â weeks agoRachy
11Â months, 1Â week agoItsBananass
1Â year, 5Â months agoChaBum
9Â months, 2Â weeks ago