exam questions

Exam IIA-CIA-Part3 All Questions

View all questions & answers for the IIA-CIA-Part3 exam

Exam IIA-CIA-Part3 topic 2 question 287 discussion

Actual exam question from IIA's IIA-CIA-Part3
Question #: 287
Topic #: 2
[All IIA-CIA-Part3 Questions]

According to The IIA's Three Lines Model, which of the following IT security activities is commonly shared by all three lines?

  • A. Assessments of third parties and suppliers.
  • B. Recruitment and retention of certified IT talent.
  • C. Classification of data and design of access privileges.
  • D. Creation and maintenance of secure network and device configuration.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
137a7a9
2 weeks, 1 day ago
Selected Answer: A
GTAG: Assessing Cybersecurity Risk The Three Lines Model Table 4 Conduct cyber risk assessments of service organizations, third parties, and suppliers (note: first and second line roles share this ongoing responsibility).
upvoted 1 times
...
emtofid
2 months, 1 week ago
Selected Answer: A
A. Assessments of third parties and suppliers. This activity involves evaluating the security practices and risks associated with third-party vendors and suppliers, which requires collaboration and oversight from all three lines of defense: management (first line), risk management and compliance functions (second line), and internal audit (third line).
upvoted 1 times
...
KonradK
1 year, 3 months ago
Shouldn't it be B or A? Any thoughts
upvoted 1 times
KonradK
1 year, 1 month ago
Or maybe in fact it should be C after reading more carefully. Each dept classifies data and design access privileges for its dept members to keep segregation of duties and adequate access rights assignment.
upvoted 1 times
Elvin
1 year, 1 month ago
This should be A. Per GTAG: Assessing cybersecurity risk.
upvoted 1 times
Elvin
1 year ago
Copy pasted from GTAG Page 12: "Conduct cyber risk assessments of service organizations, third parties, and suppliers (note: first and second lines of defense share this ongoing responsibility)"
upvoted 1 times
KLynn
6 months, 4 weeks ago
which of the following IT security activities is commonly “shared by all three lines”?
upvoted 1 times
...
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago