Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CRISC Topic 7 Question 95 Discussion

Actual exam question for Isaca's CRISC exam
Question #: 95
Topic #: 7
[All CRISC Questions]

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

Show Suggested Answer Hide Answer
Suggested Answer: D

Information systems control deficiencies are the weaknesses or flaws in the design or implementation of the controls that are intended to ensure the confidentiality, integrity, availability, and reliability of the information systems and resources. Information systems control deficiencies may reduce the effectiveness or efficiency of the controls, and expose the organization to various risks, such as unauthorized access, data loss, system failure, etc.

Reviewing results from control self-assessment (CSA) is the best way to identify information systems control deficiencies, because CSA is a process of evaluating and verifying the adequacy and effectiveness of the information systems controls, using the input and feedback from the individuals or groups that are involved or responsible for the information systems activities or functions. CSA can help the organization to identify and document the information systems control deficiencies, and to align them with the organization's information systems objectives and requirements.

CSA can be performed using various techniques, such as questionnaires, surveys, interviews, workshops, etc. CSA can also be integrated with the organization's governance, risk management, and compliance functions, and aligned with the organization's policies and standards.

The other options are not the best ways to identify information systems control deficiencies, because they do not provide the same level of detail and insight that CSA provides, and they may not be relevant or actionable for the organization.

Vulnerability and threat analysis is a process of identifying and evaluating the weaknesses or flaws in the organization's assets, processes, or systems that can be exploited or compromised by the potential threats or sources of harm that may affect the organization's objectives or operations. Vulnerability and threat analysis can help the organization to assess and prioritize the risks, and to design and implement appropriate controls or countermeasures to mitigate or prevent the risks, but it is not the best way to identify information systems control deficiencies, because it does not indicate whether the existing information systems controls are adequate and effective, and whether they comply with the organization's policies and standards.

Control remediation planning is a process of selecting and implementing the actions or plans to address or correct the information systems control deficiencies that have been identified, analyzed, and evaluated. Control remediation planning involves choosing one of the following types of control responses: mitigate, transfer, avoid, or accept. Control remediation planning can help the organization to improve and optimize the information systems controls, and to reduce or eliminate the information systems control deficiencies, but it is not the best way to identify information systems control deficiencies, because it is a subsequent or follow-up process that depends on the prior identification of the information systems control deficiencies.

User acceptance testing (UAT) is a process of verifying and validating the functionality and usability of the information systems and resources, using the input and feedback from the end users or customers that interact with the information systems and resources. UAT can help the organization to ensure that the information systems and resources meet the user or customer expectations and requirements, and to identify and resolve any issues or defects that may affect the user or customer satisfaction, but it is not the best way to identify information systems control deficiencies, because it does not focus on the information systems controls, and it may not cover all the relevant or significant information systems control deficiencies that may exist or arise.Reference=

ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 40-41, 47-48, 54-55, 58-59, 62-63

ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 186

CRISC Practice Quiz and Exam Prep


Contribute your Thoughts:

Freeman
26 days ago
That's true, but I still think D) Control self-assessment (CSA) is the best option.
upvoted 0 times
...
Cheryl
27 days ago
But wouldn't C) User acceptance testing (UAT) also help identify control deficiencies?
upvoted 0 times
...
Laila
28 days ago
I think B) Control remediation planning is the most effective.
upvoted 0 times
...
Freeman
29 days ago
I disagree, I believe it's D) Control self-assessment (CSA).
upvoted 0 times
...
Dierdre
2 months ago
User acceptance testing (UAT)? More like 'user acceptance tortured', amirite? But for real, CSA is the way to go.
upvoted 0 times
Elbert
20 days ago
True, but CSA provides a more comprehensive view of control deficiencies.
upvoted 0 times
...
Lindsay
21 days ago
Vulnerability and threat analysis can also be helpful in identifying weaknesses.
upvoted 0 times
...
Oretha
23 days ago
I agree, CSA allows for a more thorough self-assessment of controls.
upvoted 0 times
...
Norah
1 months ago
CSA is definitely the way to go for identifying control deficiencies.
upvoted 0 times
...
...
Cheryl
2 months ago
I think the best way is A) Vulnerability and threat analysis.
upvoted 0 times
...
Benton
2 months ago
Hmm, I'm thinking vulnerability and threat analysis is the real MVP here. You can't fix what you don't know is broken, ya know?
upvoted 0 times
...
Troy
2 months ago
Whoa, control self-assessment (CSA) is definitely the way to go! Gotta love that internal audit feeling, am I right?
upvoted 0 times
Bernardo
1 months ago
Yeah, internal audit is always a fun time.
upvoted 0 times
...
Twila
1 months ago
CSA is a great way to identify control deficiencies.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77