A. Assessments of third parties and suppliers. This activity involves evaluating the security practices and risks associated with third-party vendors and suppliers, which requires collaboration and oversight from all three lines of defense: management (first line), risk management and compliance functions (second line), and internal audit (third line).
Or maybe in fact it should be C after reading more carefully. Each dept classifies data and design access privileges for its dept members to keep segregation of duties and adequate access rights assignment.
Copy pasted from GTAG Page 12: "Conduct cyber risk assessments of service organizations, third parties, and suppliers (note: first and second lines of defense share this ongoing responsibility)"
which of the following IT security activities is commonly “shared by all three lines”?
upvoted 1 times
...
...
...
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
emtofid
3 weeks, 6 days agoKonradK
1 year, 1 month agoKonradK
1 year agoElvin
11 months, 3 weeks agoElvin
11 months, 2 weeks agoKLynn
5 months, 1 week ago