Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 1492 discussion

Actual exam question from Isaca's CISA
Question #: 1492
Topic #: 1
[All CISA Questions]

Which of the following BEST enables an organization to identify potential security threats associated with a virtualization technique proposed by the vendor of a popular virtual machine (VM) system?

  • A. Architecture design
  • B. Functional specifications
  • C. Risk assessment
  • D. Hypervisor logs
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Enig
4 days, 4 hours ago
C If implement = D, it is only proposed therefore Risk assessment, C
upvoted 1 times
...
RS66
3 months ago
Selected Answer: C
Those who are saying D can you explain how do you check logs of a system that doesn't exist yet? This system is proposed by the vendor, not implemented yet. Answer is C.
upvoted 3 times
...
46080f2
5 months ago
Selected Answer: D
C. is only to confuse. The question of what is best for a narrowly described area. A typical ISACA question and typically the answer specific to the narrowed area is the correct one. For example, C. is far too general, whereas D. is very specific in relation to the limited context of the question. So D. is the correct answer from my ISACA experience.
upvoted 1 times
...
shalota2
5 months, 1 week ago
D is only to confuse. I think is C the right answer
upvoted 1 times
...
Swallows
5 months, 2 weeks ago
Selected Answer: D
Hypervisor logs provide detailed information about the activities and events occurring within the virtualized environment. By analyzing these logs, an organization can identify potential security threats associated with a virtualization technique proposed by the vendor of a popular virtual machine (VM) system. Hypervisor logs record various activities such as virtual machine creation, deletion, resource allocation, network traffic, and system configuration changes. Analyzing these logs allows organizations to detect unauthorized access, unusual behaviors, and potential security vulnerabilities within the virtualized environment, enabling them to take proactive measures to mitigate security risks. While risk assessment (option C) is important for identifying and prioritizing security threats, hypervisor logs provide real-time data that directly relates to the operation of the virtualization technique and can reveal specific security issues within the VM system.
upvoted 1 times
...
a84n
6 months, 1 week ago
Selected Answer: C
Correct Answer is C option D may not proactively identify potential security threats associated with a proposed virtualization technique.
upvoted 1 times
...
hermfrancis
7 months, 1 week ago
Selected Answer: D
For ISACA's logic about the questions, D should be the answer because C is not only for VM environments.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...