B. Threat and vulnerability analysis.
Threat and vulnerability analysis is essential in understanding the potential risks that IT systems and assets face. By identifying and assessing threats (potential sources of harm) and vulnerabilities (weaknesses in the system that can be exploited), organizations can create realistic and relevant IT risk scenarios. These scenarios form the basis for risk assessments and help organizations prioritize their risk mitigation efforts effectively.
Remember they are only pulling the questions, not the "correct" answers when they create these lists for us. The answers are guessed at in the same manner as someone taking the exam.
B is correct: Who selects these answers for people to fail the exam?.
The risk scenario should be based on an identified risk. A risk scenario is developed on the basis of potential threats to the business assets. A risk practitioner can identify potential threats from the risk register.
This section is not available anymore. Please use the main Exam Page.CRISC Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aselunar
Highly Voted 3 years, 1 month agoRaj1510
Highly Voted 2 years, 6 months agoStaanlee
Most Recent 10 months, 2 weeks agoCbtL
1 year, 3 months agoKoulyo
1 year, 3 months agoCbtL
1 year, 3 months agojohn_boogieman
1 year, 5 months agoSuchib
1 year, 7 months agoBituBaba
1 year, 9 months agoCeecil1959
2 years, 4 months agoStefan07
3 years, 2 months agooguz_1523
3 years, 2 months ago