New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Cybersecurity-Audit-Certificate Exam - Topic 4 Question 47 Discussion

Actual exam question for Isaca's Cybersecurity-Audit-Certificate exam
Question #: 47
Topic #: 4
[All Cybersecurity-Audit-Certificate Questions]

Which of the following is MOST likely to result in unidentified cybersecurity risks?

Show Suggested Answer Hide Answer
Suggested Answer: B

When roles and responsibilities for cybersecurity are not clearly identified and formalized, it can lead to confusion and gaps in the cybersecurity posture of an organization. Without clear accountability, certain risks may not be identified, managed, or mitigated effectively, leading to potential vulnerabilities that could be exploited.

Reference= The importance of defining roles and responsibilities is highlighted in various cybersecurity frameworks and best practices, including those recommended by ISACA.It is a common theme in cybersecurity governance to ensure that all individuals within an organization understand their role in maintaining cybersecurity1.


Contribute your Thoughts:

0/2000 characters
Velda
9 hours ago
C) seems less critical, but still important.
upvoted 0 times
...
Ressie
6 days ago
Totally agree, B) is also a major risk factor!
upvoted 0 times
...
Sophia
11 days ago
A) Lack of cybersecurity procedures and guidelines is a big issue.
upvoted 0 times
...
Carman
16 days ago
I'm going to have to go with B. Gotta have those roles and responsibilities nailed down.
upvoted 0 times
...
Ryan
21 days ago
D all the way! Without proper recovery processes, you're just asking for trouble when a breach happens.
upvoted 0 times
...
Ellen
26 days ago
Hmm, I'm going with C. Lack of disclosure protocols means breaches can go unnoticed and unaddressed.
upvoted 0 times
...
Brunilda
1 month ago
Recovery processes seem crucial, but I wonder if D is more about response than identifying risks. This one's tricky!
upvoted 0 times
...
Antonio
1 month ago
I think I saw a practice question similar to this, and it emphasized the importance of protocols, which makes me lean towards C.
upvoted 0 times
...
Dorethea
1 month ago
I'm not entirely sure, but I feel like B could also be a big issue since unclear roles can lead to missed risks.
upvoted 0 times
...
Rodolfo
2 months ago
I think I'd go with option B. Defining those cybersecurity roles and responsibilities is key to making sure everything is covered.
upvoted 0 times
...
Ilona
2 months ago
Establishing recovery processes seems really important too. If you can't bounce back from an incident, the risks just keep piling up.
upvoted 0 times
...
Elvera
2 months ago
Ooh, that's a tough one. I'm leaning towards the lack of disclosure protocols - if breaches aren't reported, how can the risks be properly assessed and addressed?
upvoted 0 times
...
Katina
2 months ago
I think the answer is B. Clearly, if you don't have defined roles and responsibilities, cybersecurity will fall through the cracks.
upvoted 0 times
...
Norah
2 months ago
I remember studying how lack of procedures can lead to gaps in security, so I think A might be a strong choice.
upvoted 0 times
...
Lashonda
2 months ago
I think A is the biggest issue. No guidelines means chaos.
upvoted 0 times
...
Robt
3 months ago
C is a huge risk too. If breaches aren't reported, how can we improve?
upvoted 0 times
...
Rosalia
3 months ago
Haha, I bet the answer is A. No procedures? That's a cybersecurity disaster waiting to happen!
upvoted 0 times
...
Nana
3 months ago
Hmm, I'm not sure. The failure to identify roles and responsibilities could also lead to a lot of gaps in coverage and accountability.
upvoted 0 times
...
Regenia
3 months ago
I think the lack of cybersecurity procedures and guidelines is the most likely to result in unidentified risks. Without clear policies, it's easy for vulnerabilities to slip through the cracks.
upvoted 0 times
...

Save Cancel