Exam CRISC All QuestionsBrowse all questions from this exam
Question 119

What is the FIRST phase of IS monitoring and maintenance process?

    Correct Answer: D

    The first phase of the IS monitoring and maintenance process is Identifying controls. This involves determining which controls need to be in place to protect information systems and ensure their integrity, confidentiality, and availability. By identifying the necessary technical and organizational controls at the very beginning, an organization can effectively plan and implement subsequent steps in the monitoring and maintenance process.

Discussion
kingsmannOption: B

Prioritizing risks should be part of the risk assessment process, not in the monitoring process.

FZ88Option: C

Shouldbe C?

JolomsOption: D

The correct answer is: D. Identifying controls Identifying controls is the initial phase in the Information Systems (IS) monitoring and maintenance process. This phase involves determining which controls need to be in place to protect information systems and ensure their integrity, confidentiality, and availability. Once controls are identified, they can be monitored and maintained effectively.

Abbey2Option: D

The first phase of Information Security (IS) monitoring and maintenance process is: D. Identifying controls.

Kennethlim79Option: D

The correct answer is D. Identifying controls. IS monitoring and maintenance is an ongoing process that involves identifying, assessing, and mitigating risks to the organization's information systems. The first step in this process is to identify the controls that are currently in place to protect the organization's information systems. This includes identifying both technical and organizational controls. Once the current controls have been identified, they need to be assessed to determine their effectiveness in mitigating risks. This will involve evaluating the likelihood and impact of potential threats and vulnerabilities, as well as the effectiveness of the controls in preventing or detecting these threats and vulnerabilities. The results of the risk assessment will be used to prioritize risks and to identify the controls that need to be strengthened or implemented. The organization will then implement the necessary controls to mitigate the risks to an acceptable level.