Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CRISC All Questions

View all questions & answers for the CRISC exam

Exam CRISC topic 1 question 1466 discussion

Actual exam question from Isaca's CRISC
Question #: 1466
Topic #: 1
[All CRISC Questions]

Which of the following is the BEST indication of a potential threat?

  • A. Excessive activity in system logs
  • B. Increase in identified system vulnerabilities
  • C. Excessive policy and standard exceptions
  • D. Ineffective risk treatment plans
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Staanlee
4 months ago
Selected Answer: A
Excessive activity in system logs is the best indication of a potential threat because it may signal unusual or unauthorized actions that could indicate an ongoing attack or security breach. Monitoring and analyzing such activity can help identify potential threats before they escalate.
upvoted 1 times
...
efe6fee
4 months, 1 week ago
Selected Answer: A
Excessive log activity
upvoted 1 times
...
K5000ism
10 months, 3 weeks ago
Selected Answer: A
A. Excessive activity in system logs Excessive activity in system logs can be a strong indication of potential threats, as it may suggest abnormal or suspicious behavior within the IT environment. Monitoring system logs for unusual patterns, unauthorized access, or other irregularities can help organizations detect and respond to potential security threats.
upvoted 1 times
...
Kennethlim79
11 months, 3 weeks ago
Selected Answer: A
The best indication of a potential threat is Excessive activity in system logs (Option A). This is because unusual or excessive activity could indicate a security incident or compromise, such as an ongoing attack or a breach. However, all the options mentioned could potentially indicate threats or issues, and the most suitable choice can vary depending on the specific circumstances and context.
upvoted 1 times
...
krishccie
1 year, 1 month ago
Selected Answer: A
A because threat is external and all other answers are related to vulnerabilities which is internal
upvoted 1 times
...
shiowbah
1 year, 3 months ago
A. Excessive activity in system logs
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...