New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CGEIT Exam - Topic 3 Question 39 Discussion

Actual exam question for Isaca's CGEIT exam
Question #: 39
Topic #: 3
[All CGEIT Questions]

Which of the following BEST facilitates the standardization of IT vendor selection?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Remedios
4 months ago
Procurement frameworks streamline the process, no doubt!
upvoted 0 times
...
Roslyn
4 months ago
Wait, how does a contract management office really help with this?
upvoted 0 times
...
Solange
4 months ago
Cost-benefit analysis is important, but it’s not the whole picture.
upvoted 0 times
...
Kiera
4 months ago
Totally agree, SLAs help but they’re not enough on their own.
upvoted 0 times
...
Melodie
5 months ago
I think a procurement framework is key for standardization.
upvoted 0 times
...
Deangelo
5 months ago
I’m a bit confused about the differences between SLAs and procurement frameworks. I remember they both have roles in vendor selection, but which one is more about standardization?
upvoted 0 times
...
Benton
5 months ago
I practiced a question similar to this, and I think the contract management office could help with consistency, but I'm leaning towards the procurement framework.
upvoted 0 times
...
Garry
5 months ago
I remember discussing procurement frameworks in class, but I'm not entirely sure how they compare to SLAs in terms of standardization.
upvoted 0 times
...
Weldon
5 months ago
I think cost-benefit analysis is important, but it might not be the best for standardizing vendor selection. I feel like SLAs could play a bigger role.
upvoted 0 times
...
Jarvis
5 months ago
Okay, I've got this. Twistlock provides runtime security by working with the identity and access management system to identify over-privileged containers and services, and then restricting their network access. That's option A, which is the correct answer here.
upvoted 0 times
...
Henriette
5 months ago
I'm a bit confused by the terminology in this question. I'll try to break down the key terms and see if I can logically deduce the correct answer.
upvoted 0 times
...
Ahmed
5 months ago
Hmm, I'm a bit unsure about this one. Should I focus on the vulnerability assessment first to identify any potential security risks? Or would a privacy impact assessment be a better starting point?
upvoted 0 times
...

Save Cancel