Exam CISSP All QuestionsBrowse all questions from this exam
Question 2

When assessing the audit capability of an application, which of the following activities is MOST important?

    Correct Answer: B

    When assessing the audit capability of an application, the most important activity is to determine if audit records contain sufficient information. This is because the primary purpose of an audit is to create a detailed record of activities that can be useful in identifying and investigating suspicious or inappropriate activities. Without sufficient information in the audit records, it would be impossible to effectively review and analyze the activities logged, rendering the audit capability ineffective regardless of other factors such as storage capacity or procedures for investigating suspicious activity.

Discussion
zo24Option: B

to me its B, the most important is the scope of the audit, the value it brings, is it sufficient to what the organization need inorder to call or even perform an actual audit. The requirement of disk size we can adjust as we needed, it can only be used to support the content of the information that the application can gather.

aape1Option: C

C, the keyword is "Capabilities". Remember the CIA, this question is about availability, not integrity. It would have been B if it was about the accuracy of the application.

pigonOption: B

Though both are important, but if can only choose 1 option, then B is more important. Cos if audit records do not contain sufficient information, then no matter how much storage alloacted also no use. Hence B is more correct.

wingcheukOption: B

I will pick B for answer. In domain 7, it says some audit examples including inspection audits, access review audits, user entitlement audits etc.The required information for each type of audit may different. The information is not ONLY referred to the audit log of an application. The audit record could be the company rules or even a physical log sheet paper of the data center. So sufficient information is most important. Answer C may be the second best but it is limited for the digit audit logs.

JoeandHeidiOption: B

So is the B or C the correct answer? I would say B if I was sitting for the test. But with this picking C as the correct answer, it's causing unwanted doubt.

vorozcoOption: B

Meant to say I'm going with B. So my previous comment should read as... Going with B. The textbook focuses on auditing capabilities requiring sufficient information. CISSP AIO Exam Guide: Ninth Edition pg. 741-743

Ramye

How is it C when capabilities focuses on requiring sufficient information?

KelvinYauOption: B

B 100%, sufficient information is most important.

jackdryanOption: B

B is correct.

farzadardaOption: C

I am having a hard time understanding this questions. How is the MOST important thing is to verify storage? https://www.reddit.com/user/cisspdumps/ There are several reasons to do a security audit. They include these six goals: Identify security problems and gaps, as well as system weaknesses. Establish a security baseline that future audits can be compared with. Comply with internal organization security policies. Comply with external regulatory requirements. Determine if security training is adequate. Identify unnecessary resources.

RamyeOption: B

Question is asking, does the application has audit capability? And that is to make sure the application audit logs contain sufficient information.

ap0ls

Not applicable now. None of these questions came up during my exam last Tuesday (April 2, 2024). Use the questions as guide in learning but don't depend that these will come up in the exam

f270069

none of the 500?

3008Option: B

B is answer

AZSIDOption: B

B is the correct option here as sufficient and valuable evidence / traces is the most focal point in Audit activities for Critical Applications.

KyankaOption: B

B is correct. The Audit records need to be sufficient. Audit storage is not the responsibility of the application.

SKainthOption: B

Because the primary purpose of an audit is to provide a RECORD OF ACTIVITIES that can be used to identify and investigate suspicious or inappropriate activities. If the audit records do not contain sufficient information, it would be difficult to achieve this goal.

TashT13Option: B

B makes the most sense. All others are irrelevant if audit does nit contains sufficient data

CPT_PepperOption: C

The question is asking specifically about the audit capability of the APPLICATION, as opposed to the effectiveness of an audit record. You cannot consider the content of the audit log if the application cannot capture and STORE logs FIRST. Of course audit log content will drive size allocation but the question was asking about the APPLICATION.

dumdada

C doesnt imply the app cant store ANY log. Moreover, what's the point of having plenty of audit log storage place if the logs themselves don't have anything of value? B is obviously the right answer. You can have terabytes of audit log space but if they only capture useless crap the audit capabilities are crap as well. BBBB.