Exam CISA All QuestionsBrowse all questions from this exam
Question 1163

As part of the risk management process, threats and vulnerabilities should be mapped to:

    Correct Answer: A

    As part of the risk management process, threats and vulnerabilities should be mapped to existing controls. This allows an organization to determine which controls are in place to mitigate the identified threats and vulnerabilities, ensuring that all potential risks are adequately managed and addressed.

Discussion
KAP2HURUFOption: B

Mapping threats to assets and vulnerabilities can help identify their possible combinations. Each threat can be associated with a specific vulnerability, or even multiple vulnerabilities. Unless a threat can exploit a vulnerability, it is not a risk to an asset.

SibsankarOption: A

Sorry for the previous message. It will be A surely

SibsankarOption: C

It seems to be C mapping threats and vulnerabilities to business objectives provides a strategic perspective on risk management, aligning it with the overall organizational goals.