Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 4 Question 47 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 47
Topic #: 4
[All Cybersecurity-Audit-Certificate Questions]

Which of the following is MOST likely to result in unidentified cybersecurity risks?

Show Suggested Answer Hide Answer
Suggested Answer: B

When roles and responsibilities for cybersecurity are not clearly identified and formalized, it can lead to confusion and gaps in the cybersecurity posture of an organization. Without clear accountability, certain risks may not be identified, managed, or mitigated effectively, leading to potential vulnerabilities that could be exploited.

Reference= The importance of defining roles and responsibilities is highlighted in various cybersecurity frameworks and best practices, including those recommended by ISACA.It is a common theme in cybersecurity governance to ensure that all individuals within an organization understand their role in maintaining cybersecurity1.


Contribute your Thoughts:

0/2000 characters
Antione
1 day ago
All options are valid, but A feels like the root cause.
upvoted 0 times
...
Major
6 days ago
B stands out for me. Without defined roles, who’s accountable?
upvoted 0 times
...
Dean
11 days ago
D matters, but without A, nothing else works well.
upvoted 0 times
...
Karan
17 days ago
I agree, but B is also critical. Roles need clarity.
upvoted 0 times
...
Gwen
22 days ago
D) is definitely a problem, but I think A) is the worst.
upvoted 0 times
...
Paola
27 days ago
Wait, how can people not have recovery processes? That's surprising!
upvoted 0 times
...
Velda
2 months ago
C) seems less critical, but still important.
upvoted 0 times
...
Ressie
2 months ago
Totally agree, B) is also a major risk factor!
upvoted 0 times
...
Sophia
2 months ago
A) Lack of cybersecurity procedures and guidelines is a big issue.
upvoted 0 times
...
Carman
2 months ago
I'm going to have to go with B. Gotta have those roles and responsibilities nailed down.
upvoted 0 times
...
Ryan
2 months ago
D all the way! Without proper recovery processes, you're just asking for trouble when a breach happens.
upvoted 0 times
...
Ellen
2 months ago
Hmm, I'm going with C. Lack of disclosure protocols means breaches can go unnoticed and unaddressed.
upvoted 0 times
...
Brunilda
3 months ago
Recovery processes seem crucial, but I wonder if D is more about response than identifying risks. This one's tricky!
upvoted 0 times
...
Antonio
3 months ago
I think I saw a practice question similar to this, and it emphasized the importance of protocols, which makes me lean towards C.
upvoted 0 times
...
Dorethea
3 months ago
I'm not entirely sure, but I feel like B could also be a big issue since unclear roles can lead to missed risks.
upvoted 0 times
...
Rodolfo
3 months ago
I think I'd go with option B. Defining those cybersecurity roles and responsibilities is key to making sure everything is covered.
upvoted 0 times
...
Ilona
3 months ago
Establishing recovery processes seems really important too. If you can't bounce back from an incident, the risks just keep piling up.
upvoted 0 times
...
Elvera
3 months ago
Ooh, that's a tough one. I'm leaning towards the lack of disclosure protocols - if breaches aren't reported, how can the risks be properly assessed and addressed?
upvoted 0 times
...
Katina
4 months ago
I think the answer is B. Clearly, if you don't have defined roles and responsibilities, cybersecurity will fall through the cracks.
upvoted 0 times
...
Norah
4 months ago
I remember studying how lack of procedures can lead to gaps in security, so I think A might be a strong choice.
upvoted 0 times
...
Lashonda
4 months ago
I think A is the biggest issue. No guidelines means chaos.
upvoted 0 times
...
Robt
4 months ago
C is a huge risk too. If breaches aren't reported, how can we improve?
upvoted 0 times
...
Rosalia
4 months ago
Haha, I bet the answer is A. No procedures? That's a cybersecurity disaster waiting to happen!
upvoted 0 times
...
Nana
5 months ago
Hmm, I'm not sure. The failure to identify roles and responsibilities could also lead to a lot of gaps in coverage and accountability.
upvoted 0 times
...
Regenia
5 months ago
I think the lack of cybersecurity procedures and guidelines is the most likely to result in unidentified risks. Without clear policies, it's easy for vulnerabilities to slip through the cracks.
upvoted 0 times
...

Save Cancel