ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 521 - CGEIT discussion

Report
Export

A large enterprise is implementing an information security policy exception process. The BEST way to ensure that security risk is properly addressed is to:

A.

confirm process owners' acceptance of residual risk.

Answers
A.

confirm process owners' acceptance of residual risk.

B.

perform an internal and external network penetration test.

Answers
B.

perform an internal and external network penetration test.

C.

obtain IT security approval on security policy exceptions.

Answers
C.

obtain IT security approval on security policy exceptions.

D.

benchmark policy against industry best practice.

Answers
D.

benchmark policy against industry best practice.

Suggested answer: A

Explanation:

The best way to ensure that security risk is properly addressed when implementing an information security policy exception process is to confirm process owners' acceptance of residual risk.Residual risk is the risk that remains after applying controls or mitigating measures to reduce the original risk1.Process owners are the individuals or groups that are responsible for the design, execution, and performance of a business process2. By confirming process owners' acceptance of residual risk, the enterprise can ensure that the security risk associated with the policy exception is understood, acknowledged, and agreed upon by the relevant stakeholders. This can also help to assign accountability and liability for the potential consequences of the policy exception, as well as to monitor and review the risk level and the effectiveness of the controls or mitigating measures. The other options are not as effective as confirming process owners' acceptance of residual risk for ensuring that security risk is properly addressed when implementing an information security policy exception process. Performing an internal and external network penetration test is a useful technique for identifying and exploiting vulnerabilities in the network infrastructure, but it does not address the specific security risk related to the policy exception. Obtaining IT security approval on security policy exceptions is a necessary step for validating and authorizing the policy exception, but it does not ensure that the process owners are aware of and accept the residual risk. Benchmarking policy against industry best practice is a good practice for comparing and improving the policy quality and performance, but it does not address the security risk associated with the policy exception.

asked 18/11/2024
Ziyad Karadsheh
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first