New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CCAK Exam - Topic 4 Question 23 Discussion

Actual exam question for Isaca's CCAK exam
Question #: 23
Topic #: 4
[All CCAK Questions]

Which of the following is an example of a corrective control?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Noelia
4 months ago
Surprised that people think A is corrective! It's clearly preventive.
upvoted 0 times
...
Silva
4 months ago
I thought corrective controls were more about fixing issues after they happen.
upvoted 0 times
...
Earleen
4 months ago
Wait, isn't logging access attempts a corrective measure?
upvoted 0 times
...
Gabriele
4 months ago
I agree, option A is not corrective.
upvoted 0 times
...
Erin
4 months ago
A central anti-virus system is definitely a preventive control, not corrective.
upvoted 0 times
...
Rashad
5 months ago
I practiced a question similar to this, and I think corrective controls are about responding to incidents. Maybe option B is the right choice since it logs attempts for later investigation?
upvoted 0 times
...
Deeanna
5 months ago
I think option A sounds more like a preventive control since it stops threats before they happen. I might be mixing up the terms though.
upvoted 0 times
...
Lajuana
5 months ago
I remember corrective controls are meant to fix issues after they occur, but I'm not sure if any of these options really fit that definition.
upvoted 0 times
...
Launa
5 months ago
I’m leaning towards option D because it seems like it’s about managing access rights after the fact, but I could be wrong. This is tricky!
upvoted 0 times
...
Whitley
5 months ago
Hmm, I'm a bit confused on this one. I'm not sure if the trap source address needs to match the NMS address or if there's some other requirement. I'll have to think this through carefully.
upvoted 0 times
...
Therese
5 months ago
I'm not totally sure about this one. The wording is a bit tricky. I'll need to think it through step-by-step to figure out the best approach.
upvoted 0 times
...
Krystina
5 months ago
Okay, I've got this! Scraping social media and using WHOIS lookup tools are definitely the way to go here. They'll allow me to quickly gather email addresses without raising any red flags with the client's cybersecurity measures.
upvoted 0 times
...

Save Cancel