New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSEP Exam - Topic 4 Question 75 Discussion

Actual exam question for ISC2's ISSEP exam
Question #: 75
Topic #: 4
[All ISSEP Questions]

Which of the following are the major tasks of risk management Each correct answer represents a complete solution. Choose two.

Show Suggested Answer Hide Answer
Suggested Answer: B

Answer option A is incorrect. The Defense Technical Information Center (DTIC) is a repository of

scientific and technical documents for the United States Department of Defense. DTIC serves the

DoD community as the largest central resource for DoD and government-funded scientific, technical,

engineering, and business related information available today. DTIC's documents are available to

DoD personnel and defense contractors, with unclassified documents also available to the public.

DTIC's aim is to serve a vital link in the transfer of information among DoD personnel, DoD

contractors, and potential contractors and other U.S. Government agency personnel and their

contractors. Answer option D is incorrect. The Defense Advanced Research Projects Agency (DARPA)

is an agency of the United States Department of Defense responsible for the development of new

technology for use by the military. DARPA has been responsible for funding the development of

many technologies which have had a major effect on the world, including computer networking, as

well as NLS, which was both the first hypertext system, and an important precursor to the

contemporary ubiquitous graphical user interface. DARPA supplies technological options for the

entire Department, and is designed to be the 'technological engine' for transforming DoD. Answer

option C is incorrect. The Defense-wide Information Assurance Program (DIAP) protects and

supports DoD information, information systems, and information networks, which is important to

the Department and the armed forces throughout the day-to-day operations, and in the time of

crisis.The DIAP uses the OSD method to plan, observe, organize, and incorporate IA activities. The

role of DIAP is to act as a facilitator for program execution by the combatant commanders, Military

Services, and Defense Agencies. The DIAP staff combines functional and programmatic skills for a

comprehensive Defense-wide approach to IA. The DIAP's main objective is to ensure that the DoD's

vital information resources are secured and protected by incorporating IA activities to get a secure

net-centric GIG operation enablement and information supremacy by applying a Defense-in-Depth

methodology that integrates the capabilities of people, operations, and technology to establish a

multi-layer, multidimensional protection.


Contribute your Thoughts:

0/2000 characters
Michal
3 months ago
A is for sure a major task, but I’m not so sure about D.
upvoted 0 times
...
Maricela
3 months ago
Totally agree with A and D! Makes sense.
upvoted 0 times
...
Albert
3 months ago
Wait, building risk-free systems? Is that even possible?
upvoted 0 times
...
Lynda
4 months ago
I think C is super important too, though.
upvoted 0 times
...
Stanford
4 months ago
Definitely A and D! Those are the key tasks.
upvoted 0 times
...
Veronika
4 months ago
Building risk-free systems sounds too idealistic to be a major task. I would lean towards risk identification and risk control based on what we studied.
upvoted 0 times
...
Noah
4 months ago
I remember a question similar to this where we had to choose between risk control and data integrity. I think risk control is a key task, but I'm uncertain about the other one.
upvoted 0 times
...
Ivette
4 months ago
I'm not so sure about the second one. I feel like risk control might be important too, but I can't recall if it was specifically mentioned in our materials.
upvoted 0 times
...
Annice
5 months ago
I think risk identification is definitely one of the major tasks. I remember practicing questions that emphasized recognizing potential risks.
upvoted 0 times
...
Dion
5 months ago
I'm a bit unsure about "Assuring the integrity of organizational data" - that seems more like an information security task than a risk management one. I'll have to think this through.
upvoted 0 times
...
Paris
5 months ago
Okay, I know risk identification and risk control are core risk management tasks. I'll select those two options.
upvoted 0 times
...
Catrice
5 months ago
This looks like a straightforward risk management question. I'll focus on identifying the key tasks and see which two options best match.
upvoted 0 times
...
Odette
5 months ago
Hmm, "Building Risk free systems" seems a bit too extreme. I'm not sure that's a realistic goal for risk management. Let me think this through carefully.
upvoted 0 times
...
Dalene
5 months ago
I think I've got a good handle on this question. The key is to use the right container image, log in to the registry, and then create the container with the specified user and service configuration.
upvoted 0 times
...
Selma
5 months ago
Based on my understanding, the best practice is to create one rule for every event. That way you can ensure each event is properly handled without any gaps or overlaps between rules.
upvoted 0 times
...
Bettye
5 months ago
Hmm, this seems like it could be a tricky one. I'll need to think through the different scenarios and how the Crosstab might behave.
upvoted 0 times
...
Tayna
10 months ago
I'm going with A and D. Risk identification is key, and then you've got to actually do something about those risks through control measures. Anything else is just window dressing. Although 'building risk-free systems' does sound like a great band name.
upvoted 0 times
Brendan
8 months ago
Building risk-free systems does sound like a cool band name, but it's not a major task of risk management.
upvoted 0 times
...
Franklyn
8 months ago
I think focusing on risk control is important too, to mitigate any potential negative impacts.
upvoted 0 times
...
Charlie
8 months ago
I agree, identifying risks is crucial to managing them effectively.
upvoted 0 times
...
...
Lera
10 months ago
Definitely A and D. You can't manage what you don't know about, and once you've identified the risks, you've got to control them. Assuring data integrity is important, but it's not one of the major tasks of risk management. Or is it? *scratches head*
upvoted 0 times
Felix
9 months ago
User 3: Yeah, I think A and D are the key tasks for risk management.
upvoted 0 times
...
Oren
9 months ago
User 2: I think focusing on data integrity is important too, but it's not a major task of risk management.
upvoted 0 times
...
Jame
9 months ago
User 1: I agree, identifying risks and controlling them are crucial.
upvoted 0 times
...
...
Jackie
10 months ago
A and D, obviously. Can't have risk control without first identifying the risks, right? Although 'building risk-free systems' does have a certain appeal. Maybe I can just wrap the whole organization in bubble wrap and call it a day.
upvoted 0 times
Erick
9 months ago
Haha, true! Maybe we can find a balance between identifying risks and building safer systems.
upvoted 0 times
...
Lauran
9 months ago
Wrapping the organization in bubble wrap might be a bit extreme, but it's a funny image to imagine!
upvoted 0 times
...
Rickie
9 months ago
I agree, identifying risks is crucial. But building risk-free systems sounds like a dream come true!
upvoted 0 times
...
Niesha
10 months ago
A and D are definitely important. You need to know what risks you're facing before you can control them.
upvoted 0 times
...
...
Ashlyn
11 months ago
I believe building risk free systems is also important to prevent risks from occurring in the first place.
upvoted 0 times
...
Pearly
11 months ago
Risk identification and risk control? Sounds like I need to identify all the risks, then lock them up in a risk-free system! No wonder they call it 'risk management' - it's like being a professional worrier.
upvoted 0 times
Ulysses
9 months ago
C) Assuring the integrity of organizational data
upvoted 0 times
...
Quinn
9 months ago
B) Building Risk free systems
upvoted 0 times
...
Malika
9 months ago
Haha, it does sound like we're professional worriers, but it's important to keep our data and systems safe.
upvoted 0 times
...
Fabiola
10 months ago
Yes, you're right! Identifying risks and controlling them are key tasks in risk management.
upvoted 0 times
...
Alesia
10 months ago
User 2: Definitely, it's all about managing those worries and keeping things secure.
upvoted 0 times
...
Tamra
10 months ago
Exactly! Identifying risks and controlling them is key in risk management.
upvoted 0 times
...
Bok
10 months ago
D) Risk control
upvoted 0 times
...
Fausto
10 months ago
User 1: Yeah, identifying risks and controlling them is key.
upvoted 0 times
...
Evangelina
10 months ago
A) Risk identification
upvoted 0 times
...
...
Whitley
11 months ago
I agree with Marsha. Risk identification helps in identifying potential risks, while risk control helps in managing and mitigating those risks.
upvoted 0 times
...
Marsha
11 months ago
I think the major tasks of risk management are risk identification and risk control.
upvoted 0 times
...

Save Cancel