CISSP Exam QuestionsBrowse all questions from this exam

CISSP Exam - Question 436


An organization needs to evaluate the effectiveness of security controls implemented on a new system. Which of the following roles should the organization entrust to conduct the evaluation?

Show Answer
Correct Answer: C

A control assessor should be entrusted to evaluate the effectiveness of newly implemented security controls on a system. Control assessors are responsible for the impartial evaluation and testing of controls to provide an objective view of their implementation, effectiveness, and potential gaps. Their independent perspective makes them ideal for assessing new controls.

Discussion

4 comments
Sign in to comment
yottabyteOption: C
Feb 3, 2023

As per NIST from google search: This role conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).

jackdryan
May 16, 2023

C is correct

InclusiveSTEAMOption: C
Oct 22, 2023

C) A control assessor should be entrusted to evaluate the effectiveness of newly implemented security controls on a system. Control assessors are specifically responsible for the impartial evaluation and testing of controls to provide an objective view of their implementation, effectiveness, and potential gaps. Their independent perspective makes them ideal for assessing new controls. The other roles have responsibilities that could introduce bias: A) The Authorizing Official authorizes system operation so may be incentivized to approve controls. B) The system owner is responsible for system security and implemented the controls, so is not independent. D) The ISSO may have been involved in control implementation and oversight.

SoleandheelOption: C
Dec 17, 2023

C. Control assessor. Control assessors, also known as security assessors or security auditors, are responsible for evaluating and assessing the security controls and safeguards in place within an information system. They conduct assessments, tests, and reviews to determine whether the controls are effectively mitigating security risks and complying with security policies, standards, and regulations.

CyberjerryOption: C
May 15, 2024

OSG 9th Edition page 340. "An AO is an authorized entity who can evaluate an IT/IS system, its operations, and its risks, and potentially issue an ATO. Other terms for AO include designated approving authority (DAA), Approving Authority (AA), Security Control Assessor (SCA), and Recommending Official (RO)