New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CRISC Exam - Topic 5 Question 89 Discussion

Actual exam question for Isaca's CRISC exam
Question #: 89
Topic #: 5
[All CRISC Questions]

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Jospeh
3 months ago
I disagree, I feel like everyone should have some access.
upvoted 0 times
...
Dalene
3 months ago
Surprised that confidentiality agreements are even an option here.
upvoted 0 times
...
Laquita
3 months ago
Limiting access to just senior management seems risky.
upvoted 0 times
...
Shannan
4 months ago
Role-based access is definitely the way to go!
upvoted 0 times
...
Ma
4 months ago
I think encrypting the risk register is a must.
upvoted 0 times
...
Chauncey
4 months ago
Requiring confidentiality agreements seems like a good idea, but I don't think it would be as effective as implementing role-based access.
upvoted 0 times
...
Josue
4 months ago
I'm a bit unsure about encrypting the risk register. It sounds good, but I wonder if it would actually prevent unauthorized access effectively.
upvoted 0 times
...
Claribel
4 months ago
I remember practicing a question about access controls, and I feel like role-based access is a strong option here. It seems to balance security and usability.
upvoted 0 times
...
James
5 months ago
I think limiting access to senior management only might not be the best choice. It could lead to a lack of awareness among other staff who need to know about certain risks.
upvoted 0 times
...
Alesia
5 months ago
Implementing role-based access sounds like a smart way to control who can access the sensitive information. That might be the best approach to reduce the potential for inappropriate exposure.
upvoted 0 times
...
Jordan
5 months ago
Encrypting the risk register is a good idea, but I'm not sure if that's the most effective solution on its own. I'll need to consider the other options as well.
upvoted 0 times
...
Dan
5 months ago
Hmm, limiting access to senior management only seems a bit too restrictive. I wonder if there's a more balanced approach that still protects the information.
upvoted 0 times
...
Gail
5 months ago
This is a tricky one. I'll need to think carefully about the different options and how they could impact the risk of exposure.
upvoted 0 times
...
Margurite
9 months ago
I'm going with option C. Gotta love that role-based access - it's like a VIP pass for the vulnerability club.
upvoted 0 times
...
Shaun
9 months ago
Encrypting the risk register? Sounds like a job for the Enigma machine!
upvoted 0 times
...
Tatum
9 months ago
Option A is like putting a lock on the barn door after the horse has already bolted. Limiting access to senior management won't do much if the register is already compromised.
upvoted 0 times
...
Malcolm
9 months ago
Requiring users to sign a confidentiality agreement (option D) is a good idea, but it doesn't actually prevent the information from being exposed. It just provides a legal recourse after the fact.
upvoted 0 times
Laurel
8 months ago
Encrypting the risk register (option E) would add an extra layer of protection to prevent unauthorized access.
upvoted 0 times
...
Brendan
8 months ago
Training employees on handling sensitive information (option C) can help prevent accidental exposure.
upvoted 0 times
...
Trinidad
8 months ago
Encrypting the risk register (option C) would add an extra layer of security to prevent unauthorized access.
upvoted 0 times
...
Kate
8 months ago
Regularly updating and reviewing the risk register (option B) can help identify and address vulnerabilities in a timely manner.
upvoted 0 times
...
Tracey
9 months ago
Implementing access controls (option A) would limit who can view the risk register.
upvoted 0 times
...
Shawnda
9 months ago
Regularly reviewing and updating the risk register (option B) can help identify and address vulnerabilities.
upvoted 0 times
...
Tasia
9 months ago
Implementing access controls (option A) would limit who can view the risk register.
upvoted 0 times
...
...
Marisha
10 months ago
I'd go with option C. Implementing role-based access ensures that only those who need to see the risk register can access it. That's a more comprehensive solution than just limiting it to senior management.
upvoted 0 times
Frankie
9 months ago
Definitely, it's important to have a system in place that controls who can view the risk register to prevent any inappropriate exposure.
upvoted 0 times
...
Alton
9 months ago
I agree, limiting access to only those who need it is crucial for protecting the organization's vulnerabilities.
upvoted 0 times
...
Gail
9 months ago
Option C sounds like a good choice. Role-based access is key to keeping sensitive information secure.
upvoted 0 times
...
...
Irving
10 months ago
Hmm, option B seems like the most straightforward way to protect sensitive information. Encrypting the risk register would keep it secure, even if someone gained unauthorized access.
upvoted 0 times
Malcolm
9 months ago
It's important to take all necessary precautions to keep our organization's information secure.
upvoted 0 times
...
Tamie
9 months ago
Encrypting the risk register would definitely reduce the potential for inappropriate exposure of vulnerabilities.
upvoted 0 times
...
Brent
9 months ago
I agree, encryption is key in protecting sensitive information from unauthorized access.
upvoted 0 times
...
Rosina
10 months ago
Option B is definitely the way to go. Encrypting the risk register is a must.
upvoted 0 times
...
...
Bobbie
11 months ago
I think encrypting the risk register could also be effective in reducing inappropriate exposure of vulnerabilities.
upvoted 0 times
...
Ona
11 months ago
I agree with Nenita. Role-based access ensures that only authorized individuals can view the risk register.
upvoted 0 times
...
Nenita
11 months ago
I think implementing role-based access would be the best option.
upvoted 0 times
...

Save Cancel