ExamGecko
Question list
Search
Search

List of questions

Search

Question 9 - CCAK discussion

Report
Export

When applying the Top Threats Analysis methodology following an incident, what is the scope of the technical impact identification step?

A.
Determine the impact on the controls that were selected by the organization to respond to identified risks.
Answers
A.
Determine the impact on the controls that were selected by the organization to respond to identified risks.
B.
Determine the impact on confidentiality, integrity and availability of the information system.
Answers
B.
Determine the impact on confidentiality, integrity and availability of the information system.
C.
Determine the impact on the financial, operational, compliance and reputation of the organization.
Answers
C.
Determine the impact on the financial, operational, compliance and reputation of the organization.
D.
Determine the impact on the physical and environmental security of the organization, excluding informational assets.
Answers
D.
Determine the impact on the physical and environmental security of the organization, excluding informational assets.
Suggested answer: D
asked 18/09/2024
Marco Romani
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first