Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CCAK Topic 2 Question 32 Discussion

Actual exam question for Isaca's CCAK exam
Question #: 32
Topic #: 2
[All CCAK Questions]

Which of the following activities is performed outside information security monitoring?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Brandon
1 months ago
Hmm, let's see... Anything but the right answer must be the wrong answer. Tricky, but I've got this!
upvoted 0 times
Jeanice
9 days ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Dierdre
18 days ago
A) Management review of the information security framework
upvoted 0 times
...
...
Dottie
1 months ago
I'm going with E) Watching cat videos during work hours. That's definitely not part of security monitoring!
upvoted 0 times
...
Dorian
1 months ago
Wait, isn't B the answer? Monitoring the effectiveness of controls is crucial for information security.
upvoted 0 times
Golda
10 days ago
A) Management review of the information security framework
upvoted 0 times
...
...
Talia
2 months ago
D seems like the right choice. Periodic risk and vulnerability reviews are important, but not part of ongoing security monitoring.
upvoted 0 times
Melissa
18 days ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Vonda
24 days ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Emily
25 days ago
A) Management review of the information security framework
upvoted 0 times
...
...
Lynelle
2 months ago
I'm going with C. Collecting and reviewing security events before escalation is a key security monitoring function.
upvoted 0 times
Inocencia
1 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Lynsey
1 months ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Ailene
1 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Graciela
2 months ago
I think A is the correct answer. Management review is not a part of the day-to-day security monitoring activities.
upvoted 0 times
Sanjuana
17 days ago
That's correct, monitoring security events is a key part of information security monitoring.
upvoted 0 times
...
Precious
24 days ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Berry
1 months ago
I agree, management review is not part of the day-to-day monitoring tasks.
upvoted 0 times
...
Raylene
1 months ago
A) Management review of the information security framework
upvoted 0 times
...
Lizbeth
1 months ago
I agree, management review is not part of day-to-day monitoring.
upvoted 0 times
...
Flo
2 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Kallie
2 months ago
I believe C) Collection and review of security events before escalation is also performed outside information security monitoring.
upvoted 0 times
...
Adolph
3 months ago
I agree with Kerrie. Monitoring the effectiveness of implemented controls is definitely part of information security monitoring.
upvoted 0 times
...
Kerrie
3 months ago
I think A) Management review of the information security framework is performed outside information security monitoring.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77