exam questions

Exam CRISC All Questions

View all questions & answers for the CRISC exam

Exam CRISC topic 1 question 1622 discussion

Actual exam question from Isaca's CRISC
Question #: 1622
Topic #: 1
[All CRISC Questions]

Which process is MOST effective to determine relevance of threats for risk scenarios?

  • A. Penetration testing
  • B. Vulnerability assessment
  • C. Root cause analysis
  • D. Business impact analysis (BIA)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
faed87a
3 weeks, 6 days ago
Selected Answer: D
sorry for confusion i think its D. BIA identifies what is critical, making it possible to know which threats matter most , VA identifies weaknesses, but doesn’t assess business relevance or impact, and PT Focuses on technical weaknesses, not on the relevance or impact of threats on business processes
upvoted 1 times
faed87a
3 weeks, 6 days ago
key word is "relevance of threats" = assess a threat is relevant to the organization
upvoted 1 times
...
...
faed87a
3 weeks, 6 days ago
Selected Answer: A
B. Vulnerability Assessment identify weakness in the system, then map them with relevant threat actor to expose them. PT is done after VA to validate , can someone get in?
upvoted 1 times
faed87a
3 weeks, 6 days ago
sorry its B
upvoted 1 times
...
...
d9iceguy
1 month, 1 week ago
Selected Answer: B
A vulnerability assessment is the most effective process to determine the relevance of threats for specific risk scenarios because it: Identifies weaknesses or exposures in systems, applications, or processes. Helps correlate which threats are actually applicable based on known vulnerabilities. Enables risk practitioners to prioritize risk scenarios based on realistic threat vectors. By understanding the organization’s vulnerabilities, practitioners can determine which threats are relevant and likely to be exploited, making the risk scenario more accurate and actionable.
upvoted 1 times
...
kaykaymuon
3 months, 1 week ago
Selected Answer: A
I think A is the most correct answer, reason being that threats exploits vulnerabilities so unless a threat exploits a vulnerability a risk event would not occur.
upvoted 1 times
...
Rozitas
5 months, 2 weeks ago
Vulnerability Assessment is the answer. A
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago