exam questions

Exam CRISC All Questions

View all questions & answers for the CRISC exam

Exam CRISC topic 1 question 654 discussion

Actual exam question from Isaca's CRISC
Question #: 654
Topic #: 1
[All CRISC Questions]

Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?

  • A. Include information security control specifications in business cases.
  • B. Identify key risk indicators (KRIs) as process output.
  • C. Identify information security controls in the requirements analysis.
  • D. Design key performance indicators (KPIs) for security in system specifications.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Staanlee
9 months ago
Selected Answer: C
C. Identify information security controls in the requirements analysis. The best way to ensure that information security risk factors are mitigated when developing in-house applications is to identify information security controls during the requirements analysis phase. This means integrating security considerations into the early stages of the application development process. By doing so, you can define security requirements, identify potential risks, and specify controls that need to be implemented to mitigate those risks.
upvoted 1 times
...
CbtL
1 year, 1 month ago
Selected Answer: C
Agree with C.
upvoted 1 times
...
john_boogieman
1 year, 3 months ago
Selected Answer: C
Without a doubt: Tasks that determine the needs or conditions to meet a new or altered solution, accounting for multiple perspectives, e.g., balancing stakeholder needs and constraints, allocation of requirements to components, breaking down complex requirements to lower level requirements (CMMI).
upvoted 2 times
...
Ceecil1959
2 years, 1 month ago
A: is my choice. Include information security control specifications in the business case. Specifications are used in the development of applications. C: Identify information security controls in the requirements analysis is identifying something in the requirements analysis. Requirements have to finalized and approved to become specifications.
upvoted 1 times
Ziggybooboo
1 year, 4 months ago
Requirements analysis would be before the business case, C for me
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...