New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 2 Question 2 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 2
Topic #: 2
[All ISSMP Questions]

Which of the following characteristics are described by the DIAP Information Readiness Assessment function?

Each correct answer represents a complete solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: A, B, C

The characteristics of the DIAP Information Readiness Assessment function are as follows:

It provides data needed to accurately assess IA readiness.

It identifies and generates IA requirements.

It performs vulnerability/threat analysis assessment.

Answer option D is incorrect. It is a function performed by the ASSET system.


Contribute your Thoughts:

0/2000 characters
Jennie
4 months ago
Totally agree with A and C, they make the most sense.
upvoted 0 times
...
Melissa
4 months ago
Wait, does it really do threat analysis? That's surprising!
upvoted 0 times
...
Mireya
4 months ago
D seems a bit off to me.
upvoted 0 times
...
Keneth
4 months ago
I think B is also a valid choice.
upvoted 0 times
...
Fausto
5 months ago
A and C are definitely correct.
upvoted 0 times
...
Salome
5 months ago
I’m leaning towards option D being incorrect. I don’t recall DIAP focusing on data storage; it seems more about assessment and analysis.
upvoted 0 times
...
Tony
5 months ago
I remember practicing a question similar to this, and I think option B is definitely relevant since identifying IA requirements is crucial for readiness assessments.
upvoted 0 times
...
Della
5 months ago
I'm not entirely sure about option A. I feel like vulnerability assessments are part of a broader security framework, but I can't recall if DIAP specifically does that.
upvoted 0 times
...
Donette
5 months ago
I think option C sounds right because it mentions assessing IA readiness, which is a key part of the DIAP function.
upvoted 0 times
...
Marshall
5 months ago
Ah, Peer to Peer - that's the one! I remember learning about that in my networking course.
upvoted 0 times
...
Mitsue
5 months ago
The question specifically mentions the --protocol option, so I'll focus on that and try to recall the different protocol options I've seen in the documentation.
upvoted 0 times
...
Leonor
5 months ago
I'm a little confused on this one. I was thinking we'd need to review the IT performance objectives and indicators first, but now I'm second-guessing that. Maybe I'm overthinking it and the key really is to start with the enterprise goals. I'll have to make sure I understand the logic behind the correct answer.
upvoted 0 times
...
Joni
5 months ago
I remember practicing a question similar to this, and I think it was about nozzles and downcomers, but it's all a bit hazy now.
upvoted 0 times
...
Vincenza
5 months ago
I was leaning toward option C, but I remember we discussed that accepting a risk without any action might not always be the best approach, especially if there's a medium likelihood involved.
upvoted 0 times
...

Save Cancel