ExamGecko
Question list
Search
Search

Related questions











Question 327 - CISA discussion

Report
Export

An IS auditor reviewing the threat assessment tor a data center would be MOST concerned if:

A.
some of the identified throats are unlikely to occur.
Answers
A.
some of the identified throats are unlikely to occur.
B.
all identified throats relate to external entities.
Answers
B.
all identified throats relate to external entities.
C.
the exercise was completed by local management.
Answers
C.
the exercise was completed by local management.
D.
neighboring organizations operations have been included.
Answers
D.
neighboring organizations operations have been included.
Suggested answer: C

Explanation:

An IS auditor reviewing the threat assessment for a data center would be most concerned if the exercise was completed by local management, because this could introduce bias, conflict of interest, or lack of expertise in the assessment process. A threat assessment is a systematic method of identifying and evaluating the potential threats that could affect the availability, integrity, or confidentiality of the data center and its assets.A threat assessment should be conducted by an independent and qualified team that has the necessary skills, knowledge, and experience to perform a comprehensive and objective analysis of the data center's environment, vulnerabilities, and risks1.

The other options are not as concerning as option C for an IS auditor reviewing the threat assessment for a data center. Option A, some of the identified threats are unlikely to occur, is not a problem as long as the likelihood and impact of each threat are properly estimated and prioritized.A threat assessment should consider all possible scenarios, even if they have a low probability of occurrence, to ensure that the data center is prepared for any eventuality2. Option B, all identified threats relate to external entities, is not a flaw as long as the assessment also considers internal threats, such as human errors, malicious insiders, or equipment failures.External threats are often more visible and severe than internal threats, but they are not the only source of risk for a data center3. Option D, neighboring organizations' operations have been included, is not a mistake as long as the assessment also focuses on the data center's own operations. Neighboring organizations' operations may have an impact on the data center's security and availability, especially if they share physical or network infrastructure or resources.A threat assessment should take into account the interdependencies and interactions between the data center and its external environment4.

ISACA, CISA Review Manual, 27th Edition, 2019

ISACA, CISA Review Questions, Answers & Explanations Database - 12 Month Subscription

Data Center Threats and Vulnerabilities1

Datacenter threat, vulnerability, and risk assessment2

Data Centre Risk Assessment3

asked 18/09/2024
Updesh Kumar
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first