ExamGecko
Question list
Search
Search

Related questions











Question 449 - CISA discussion

Report
Export

An IS auditor reviewing the throat assessment for a data cantor would be MOST concerned if:

A.
some of the identified threats are unlikely to occur.
Answers
A.
some of the identified threats are unlikely to occur.
B.
all identified threats relate to external entities.
Answers
B.
all identified threats relate to external entities.
C.
the exercise was completed by local management.
Answers
C.
the exercise was completed by local management.
D.
neighboring organizations' operations have been included.
Answers
D.
neighboring organizations' operations have been included.
Suggested answer: B

Explanation:

: An IS auditor reviewing the threat assessment for a data center would be most concerned if all identified threats relate to external entities. This indicates that the threat assessment is incomplete and biased, as it ignores the potential threats from internal sources, such as employees, contractors, vendors, or authorized visitors. Internal threats can pose significant risks to the data center, as they may have access to sensitive information, systems, or facilities, and may exploit their privileges for malicious or fraudulent purposes.According to a study by IBM, 60% of cyberattacks in 2015 were carried out by insiders1

Some of the identified threats are unlikely to occur is not a cause for concern, as it shows that the threat assessment is comprehensive and realistic, and considers all possible scenarios, regardless of their probability. A threat assessment should not exclude any potential threats based on subjective judgments or assumptions, as they may still have a high impact if they materialize.

The exercise was completed by local management is not a cause for concern, as it shows that the threat assessment is conducted by the people who are most familiar with the data center's operations, environment, and risks. Local management may have more relevant and accurate information and insights than external parties, and may be more invested in the outcome of the threat assessment.

Neighboring organizations' operations have been included is not a cause for concern, as it shows that the threat assessment is holistic and contextual, and considers the interdependencies and influences of external factors on the data center's security. Neighboring organizations' operations may pose direct or indirect threats to the data center, such as physical damage, network interference, or shared vulnerabilities.

IBM Security Services 2016 Cyber Security Intelligence Index1

asked 18/09/2024
Oky ramadhani
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first