ExamGecko
Question list
Search
Search

Question 234 - CISM discussion

Report
Export

An organization is in the process of acquiring a new company Which of the following would be the BEST approach to determine how to protect newly acquired data assets prior to integration?

A.
Include security requirements in the contract
Answers
A.
Include security requirements in the contract
B.
Assess security controls.
Answers
B.
Assess security controls.
C.
Perform a risk assessment
Answers
C.
Perform a risk assessment
D.
Review data architecture.
Answers
D.
Review data architecture.
Suggested answer: C

Explanation:

Performing a risk assessment is the best approach to determine how to protect newly acquired data assets prior to integration, as it will help to identify the threats, vulnerabilities, impacts, and likelihoods of the data assets, and to prioritize the appropriate risk treatment options. Including security requirements in the contract is a good practice, but it may not be sufficient to address the specific risks of the data assets.Assessing security controls and reviewing data architecture are also important steps, but they should be done after performing a risk assessment, as they will depend on the risk level and the risk app

The best approach to determine how to protect newly acquired data assets prior to integration is to perform a risk assessment. A risk assessment will identify the various threats and vulnerabilities associated with the data assets and help the organization develop an appropriate security strategy. This risk assessment should include an assessment of the security controls in place to protect the data, a review of the data architecture, and a review of any contractual requirements related to security.

asked 01/10/2024
Aziz ZENNOUN
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first