ExamGecko
Question list
Search
Search

Related questions











Question 390 - CISA discussion

Report
Export

When reviewing a data classification scheme, it is MOST important for an IS auditor to determine if.

A.
each information asset is to a assigned to a different classification.
Answers
A.
each information asset is to a assigned to a different classification.
B.
the security criteria are clearly documented for each classification
Answers
B.
the security criteria are clearly documented for each classification
C.
Senior IT managers are identified as information owner.
Answers
C.
Senior IT managers are identified as information owner.
D.
the information owner is required to approve access to the asset
Answers
D.
the information owner is required to approve access to the asset
Suggested answer: B

Explanation:

When reviewing a data classification scheme, it is most important for an IS auditor to determine if the security criteria are clearly documented for each classification. This will help the IS auditor to evaluate if the data classification scheme is consistent, comprehensive, and aligned with the organizational objectives and regulatory requirements.The security criteria should define the level of confidentiality, integrity, and availability for each data classification, as well as the corresponding controls such as access control, rights management, and cryptographic protection1. The other options are less important or incorrect because:

A . Each information asset is not necessarily assigned to a different classification.Data classification schemes usually have a limited number of categories, such as ''Sensitive,'' ''Confidential,'' and ''Public,'' and multiple information assets can belong to the same category2.

C . Senior IT managers are not necessarily identified as information owners.Information owners are typically the business units or functions that create, use, or maintain the information assets, and they may or may not be senior IT managers3.

D . The information owner is not required to approve access to the asset.The information owner is responsible for defining the access requirements and rules for the asset, but the actual approval of access requests may be delegated to other roles, such as data custodians or administrators3.Reference:Simplify and Contextualize Your Data Classification Efforts - ISACA,3.7: Establish and Maintain a Data Classification Scheme,Data Classification and Practices - NIST,CISA Exam Content Outline | CISA Certification | ISACA

asked 18/09/2024
Manuela Kays
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first