CISA Exam QuestionsBrowse all questions from this exam

CISA Exam - Question 1163


As part of the risk management process, threats and vulnerabilities should be mapped to:

Show Answer
Correct Answer: AB

As part of the risk management process, threats and vulnerabilities should be mapped to existing controls. This allows an organization to determine which controls are in place to mitigate the identified threats and vulnerabilities, ensuring that all potential risks are adequately managed and addressed.

Discussion

3 comments
Sign in to comment
KAP2HURUFOption: B
Dec 25, 2023

Mapping threats to assets and vulnerabilities can help identify their possible combinations. Each threat can be associated with a specific vulnerability, or even multiple vulnerabilities. Unless a threat can exploit a vulnerability, it is not a risk to an asset.

SibsankarOption: C
Feb 18, 2024

It seems to be C mapping threats and vulnerabilities to business objectives provides a strategic perspective on risk management, aligning it with the overall organizational goals.

SibsankarOption: A
Jun 11, 2024

Sorry for the previous message. It will be A surely