exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 916 discussion

Actual exam question from Isaca's CISM
Question #: 916
Topic #: 1
[All CISM Questions]

An information security manager has completed a risk assessment and has determined the residual risk. Which of the following should be the NEXT step?

  • A. Implement countermeasures to mitigate risk.
  • B. Classify all identified risks.
  • C. Conduct an evaluation of controls.
  • D. Determine if the risk is within the risk appetite.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
richck102
Highly Voted 3 months, 1 week ago
D. Determine if the risk is within the risk appetite.
upvoted 6 times
...
Uncle_Lucifer
Most Recent 1 month ago
Selected Answer: D
D for sure. How can you be thinking of controls when you haven't verified it risk is within org acceptable threshold?
upvoted 1 times
...
Soleandheel
1 month, 1 week ago
D. Determine if the risk is within the risk appetite. When it comes to residual risk, determining the risk appetite is most essential. If the residual risk is within the organizations risk appetite threshold then the residual risk can be managed but if it is above the organizations risk appetite threshold then the organization could decide on other measures like risk transference e.g. Insurance... etc.
upvoted 2 times
...
Cyberbug2021
1 month, 2 weeks ago
Selected Answer: D
B is done, then is D, Then C and Then A
upvoted 2 times
...
Cyberbug2021
1 month, 2 weeks ago
Selected Answer: D
D. Determine if the risk is within the risk appetite
upvoted 2 times
...
koala_lay
2 months, 4 weeks ago
Selected Answer: C
After completing a risk assessment and determining the residual risk, the NEXT step would typically be: C. Conduct an evaluation of controls. Conducting an evaluation of controls involves assessing the effectiveness of the existing controls in place to mitigate the identified risks. This step helps determine whether the controls are adequate or if additional measures are needed to reduce the residual risk further. By evaluating controls, the information security manager can identify any gaps or weaknesses in the current control environment. This evaluation allows for an informed decision-making process regarding the implementation of countermeasures to mitigate the risks effectively.
upvoted 1 times
...
oluchecpoint
4 months ago
Selected Answer: C
C. Conduct an evaluation of controls. Once you have identified the residual risk, you should assess the effectiveness of the existing controls or countermeasures in place to mitigate that risk. This evaluation helps you understand whether the controls are adequate or if additional measures are required. It is essential to ensure that the controls are functioning as expected and providing the desired level of risk reduction. After the evaluation of controls, you can proceed with implementing countermeasures if necessary or determine if the risk is within the organization's risk appetite.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago