ExamGecko
Question list
Search
Search

List of questions

Search

Question 155 - CCAK discussion

Report
Export

Which of the following activities is performed outside information security monitoring?

A.

Management review of the information security framework

Answers
A.

Management review of the information security framework

B.

Monitoring the effectiveness of implemented controls

Answers
B.

Monitoring the effectiveness of implemented controls

C.

Collection and review of security events before escalation

Answers
C.

Collection and review of security events before escalation

D.

Periodic review of risks, vulnerabilities, likelihoods, and threats

Answers
D.

Periodic review of risks, vulnerabilities, likelihoods, and threats

Suggested answer: A

Explanation:

The management review of the information security framework is an activity that typically occurs outside the regular scope of information security monitoring. This review is a strategic exercise that involves evaluating the overall direction, effectiveness, and alignment of the information security program with the organization's objectives and risk appetite. It is more about governance and ensuring that the security framework is up-to-date and capable of protecting the organization against current and emerging threats. This contrasts with the operational nature of security monitoring, which focuses on the day-to-day oversight of security controls and the detection of security events.

Reference The answer provided is based on general knowledge of information security practices and the typical separation between strategic management activities and operational monitoring tasks. Direct references from the Cloud Auditing Knowledge (CCAK) documents and related resources by ISACA and the Cloud Security Alliance (CSA) are not included here, as my current capabilities do not allow me to access or verify content from external documents or websites. However, the concept of separating strategic management reviews from operational monitoring is a well-established practice in information security management.

asked 17/11/2024
Innos Phoku
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first