New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CGEIT Exam - Topic 5 Question 52 Discussion

Actual exam question for Isaca's CGEIT exam
Question #: 52
Topic #: 5
[All CGEIT Questions]

To minimize the potential mishandling of customer personal information in a system located in a country with strict privacy regulations which of the following is the BEST action to take?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Ruthann
4 months ago
Updating the architecture might help too, but DLP is key.
upvoted 0 times
...
Gayla
4 months ago
Wait, is DLP really the best option? Sounds risky!
upvoted 0 times
...
Casie
4 months ago
I think revising the IT plan could be more effective.
upvoted 0 times
...
Colette
4 months ago
Totally agree, DLP is essential for compliance.
upvoted 0 times
...
Earleen
4 months ago
Implementing DLP is a must!
upvoted 0 times
...
Iluminada
5 months ago
Updating the information architecture could help, but I feel like it’s more about how data is structured rather than directly preventing loss or mishandling.
upvoted 0 times
...
Dortha
5 months ago
Establishing new IT key risk indicators (KRIs) sounds important, but I wonder if it would actually prevent mishandling of data like DLP would.
upvoted 0 times
...
Johnathon
5 months ago
I think implementing data loss prevention (DLP) is crucial, but I'm not entirely sure if it's the best option here.
upvoted 0 times
...
Michell
5 months ago
I remember a practice question where revising the IT strategic plan was suggested, but I feel like DLP might be more directly related to protecting personal information.
upvoted 0 times
...
Margurite
5 months ago
I'm leaning towards option A - creating a new routing rule and invoking it immediately. That seems like a key capability of business rules in workflow routing, but I'll double-check the other options just to be sure.
upvoted 0 times
...
Bernardine
5 months ago
The dashboard probably shows the current threats being tracked by the SOC, so I'll choose option C.
upvoted 0 times
...
Allene
5 months ago
Hmm, I'm not entirely sure about this one. I know MFA can be used to secure various resources, but I'll need to think through the specifics of this question.
upvoted 0 times
...

Save Cancel