New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CCAK Exam - Topic 2 Question 32 Discussion

Actual exam question for Isaca's CCAK exam
Question #: 32
Topic #: 2
[All CCAK Questions]

Which of the following activities is performed outside information security monitoring?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Juan
3 months ago
Surprised that people think A is monitoring!
upvoted 0 times
...
Odelia
3 months ago
Nope, C is more about monitoring, not A.
upvoted 0 times
...
Miesha
4 months ago
Wait, isn't reviewing risks part of monitoring too?
upvoted 0 times
...
Delisa
4 months ago
I agree, A is the right choice!
upvoted 0 times
...
Edgar
4 months ago
Management review is definitely outside monitoring.
upvoted 0 times
...
Toshia
4 months ago
Collection and review of security events feels like it should be part of monitoring, so I'm leaning towards A as the answer.
upvoted 0 times
...
Becky
4 months ago
I'm a bit confused about the periodic review of risks. It seems related to monitoring, but maybe it's more about assessment?
upvoted 0 times
...
Art
5 months ago
I remember a practice question similar to this, and I think monitoring the effectiveness of controls is definitely part of security monitoring.
upvoted 0 times
...
Ngoc
5 months ago
I think the management review of the information security framework might be the one that's outside monitoring, but I'm not entirely sure.
upvoted 0 times
...
Cherry
5 months ago
I'm a bit confused by this question. The relationship between test automation and continuous deployment isn't totally clear to me. I'll have to think it through carefully and try to apply my understanding of these concepts.
upvoted 0 times
...
Carmela
5 months ago
Okay, I've got this. The main advantages of star over ring are that it's more resilient to failures, since a problem with one cable only affects two nodes, and the central connection point makes it easier to add or remove devices. I feel good about being able to identify those two key points.
upvoted 0 times
...
Adell
5 months ago
Definitely don't want to use the OWS system style - that's way too limiting. I'm leaning towards the CSS component, but the JS option is intriguing too.
upvoted 0 times
...
Kris
5 months ago
I remember discussing WCF and NET remoting in our last practice session, but option B seems too simple; it can't be that interchangeable, right?
upvoted 0 times
...
Brandon
9 months ago
Hmm, let's see... Anything but the right answer must be the wrong answer. Tricky, but I've got this!
upvoted 0 times
Raylene
8 months ago
D) Periodic review of risks, vulnerabilities, likelihoods, and threats
upvoted 0 times
...
Shenika
8 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Jeanice
9 months ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Dierdre
9 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Dottie
9 months ago
I'm going with E) Watching cat videos during work hours. That's definitely not part of security monitoring!
upvoted 0 times
...
Dorian
10 months ago
Wait, isn't B the answer? Monitoring the effectiveness of controls is crucial for information security.
upvoted 0 times
Cristy
8 months ago
Absolutely, each of these activities plays a crucial role in maintaining a secure information environment.
upvoted 0 times
...
Rolande
8 months ago
D) Periodic review of risks, vulnerabilities, likelihoods, and threats
upvoted 0 times
...
Craig
8 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Ocie
8 months ago
A) Management review of the information security framework
upvoted 0 times
...
Shanice
8 months ago
I think it's important to consider all these activities to ensure comprehensive information security monitoring.
upvoted 0 times
...
Isadora
8 months ago
D) Periodic review of risks, vulnerabilities, likelihoods, and threats
upvoted 0 times
...
Candra
8 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Nikita
8 months ago
A) Management review of the information security framework
upvoted 0 times
...
James
8 months ago
Yes, you are correct. Monitoring the effectiveness of controls is indeed a key activity in information security monitoring.
upvoted 0 times
...
Simona
8 months ago
D) Periodic review of risks, vulnerabilities, likelihoods, and threats
upvoted 0 times
...
Micaela
8 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Jacinta
8 months ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Golda
9 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Talia
10 months ago
D seems like the right choice. Periodic risk and vulnerability reviews are important, but not part of ongoing security monitoring.
upvoted 0 times
Melissa
9 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Vonda
9 months ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Emily
9 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Lynelle
10 months ago
I'm going with C. Collecting and reviewing security events before escalation is a key security monitoring function.
upvoted 0 times
Inocencia
9 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Lynsey
9 months ago
B) Monitoring the effectiveness of implemented controls
upvoted 0 times
...
Ailene
10 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Graciela
11 months ago
I think A is the correct answer. Management review is not a part of the day-to-day security monitoring activities.
upvoted 0 times
Sanjuana
9 months ago
That's correct, monitoring security events is a key part of information security monitoring.
upvoted 0 times
...
Precious
9 months ago
C) Collection and review of security events before escalation
upvoted 0 times
...
Berry
9 months ago
I agree, management review is not part of the day-to-day monitoring tasks.
upvoted 0 times
...
Raylene
9 months ago
A) Management review of the information security framework
upvoted 0 times
...
Lizbeth
9 months ago
I agree, management review is not part of day-to-day monitoring.
upvoted 0 times
...
Flo
10 months ago
A) Management review of the information security framework
upvoted 0 times
...
...
Kallie
11 months ago
I believe C) Collection and review of security events before escalation is also performed outside information security monitoring.
upvoted 0 times
...
Adolph
11 months ago
I agree with Kerrie. Monitoring the effectiveness of implemented controls is definitely part of information security monitoring.
upvoted 0 times
...
Kerrie
11 months ago
I think A) Management review of the information security framework is performed outside information security monitoring.
upvoted 0 times
...

Save Cancel