Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 274 discussion

Actual exam question from Isaca's CISM
Question #: 274
Topic #: 1
[All CISM Questions]

Which of the following is the BEST way to evaluate the impact of threat events on an organization's IT operations?

  • A. Risk assessment
  • B. Penetration testing
  • C. Scenario analysis
  • D. Controls review
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 9 months ago
Selected Answer: C
C. Scenario analysis Scenario analysis is the best way to evaluate the impact of threat events on an organization's IT operations. Scenario analysis involves identifying potential threat events and simulating their impact on the organization's IT systems and processes. This allows organizations to assess the risks associated with different threat scenarios and to develop plans and procedures to respond to and mitigate those risks. This approach can help organizations understand the potential impact of a threat event and make informed decisions about how to best protect their IT operations. Risk assessment, penetration testing and controls review are important activities, but they do not provide a clear picture of the impact of the threat event on IT operations as a whole.
upvoted 8 times
...
Josef4CISM
Most Recent 1 day ago
A risk assessment includes the assessment of the applicability of threats (in other words: a risk assessment includes the scenario analysis). Hence, to me its A.
upvoted 1 times
...
oluchecpoint
9 months, 3 weeks ago
Selected Answer: C
C. Scenario analysis involves creating hypothetical scenarios or situations in which a threat event occurs and then evaluating the potential impact on the organization's IT operations. This method allows you to assess the real-world consequences of various threat events and helps you understand how they could affect your organization's systems, data, and overall operations. It also enables you to identify vulnerabilities and weaknesses in your current security measures and develop appropriate mitigation strategies. While risk assessment, penetration testing, and controls review are valuable security practices, they focus on different aspects of security
upvoted 1 times
iyke2k4
2 months, 2 weeks ago
Risk assessment is highly related to threat events.
upvoted 2 times
...
...
oluchecpoint
9 months, 3 weeks ago
Selected Answer: C
C. Scenario analysis involves creating hypothetical scenarios or situations in which a threat event occurs and then evaluating the potential impact on the organization's IT operations. This method allows you to assess the real-world consequences of various threat events and helps you understand how they could affect your organization's systems, data, and overall operations. It also enables you to identify vulnerabilities and weaknesses in your current security measures and develop appropriate mitigation strategies. While risk assessment, penetration testing, and controls review are valuable security practices, they focus on different aspects of security
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
C. Scenario analysis involves creating hypothetical scenarios or situations in which a threat event occurs and then evaluating the potential impact on the organization's IT operations. This method allows you to assess the real-world consequences of various threat events and helps you understand how they could affect your organization's systems, data, and overall operations. It also enables you to identify vulnerabilities and weaknesses in your current security measures and develop appropriate mitigation strategies. While risk assessment, penetration testing, and controls review are valuable security practices, they focus on different aspects of security
upvoted 1 times
...
Rowlandmarc
1 year, 3 months ago
Selected Answer: B
A... assessing the risk/impact ... scenario analysis would not cover this I believe
upvoted 1 times
...
Goseu
1 year, 3 months ago
Selected Answer: A
I like A
upvoted 2 times
...
jennarink13
1 year, 4 months ago
Going with A. Risk scenario aids in risk identification (NOT evaluation) which is then used as an input in Risk Assessment where you evaluate both impact and likelihood qualitatively or quantitatively.
upvoted 3 times
...
richck102
1 year, 5 months ago
C. Scenario analysis
upvoted 1 times
...
dark_3k03r
1 year, 6 months ago
Selected Answer: C
The correct answer is : (C.) Scenario analysis. The keywords are "threat events" and "on organization's IT Operation". This tells me that this is a very specific scenario. Rationale: (A.) Risk assessment is incorrect cause this is too broad. It is used to identify the threats, probability, and impact. We already know the threat events and probability isn't a concern. So it's a lot of extra work when a scenario analysis will do. (B.) Penetration testing is incorrect cause it is primarily concerned with testing the control's effectiveness and confirming vulnerabilities. It's not designed to assess impacts. This is just a byproduct and the question asked for BEST. (D.) Controls review is designed to figure out it's effectiveness, but does nothing to assess impact which is one of the keywords "evaluate the imapct".
upvoted 4 times
...
Abhey
1 year, 6 months ago
Selected Answer: A
A. Risk assessment is the BEST way to evaluate the impact of threat events on an organization's IT operations. Risk assessment is a systematic approach to identifying, analyzing, and evaluating risks to an organization's assets, including IT systems and data. By conducting a risk assessment, an organization can identify potential threats and vulnerabilities, evaluate the likelihood and potential impact of those threats, and develop strategies to mitigate or manage the risks. This allows an organization to make informed decisions about how to allocate resources to protect its IT operations and prioritize efforts to address the most significant risks.
upvoted 3 times
...
[Removed]
1 year, 8 months ago
A. Risk assessment is the best way to evaluate the impact of threat events on an organization's IT operations
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...