New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSMP Exam - Topic 5 Question 7 Discussion

Actual exam question for ISC2's ISSMP exam
Question #: 7
Topic #: 5
[All ISSMP Questions]

You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your company. You have completed the risk analysis processes for the risk events. You and the project team have created risk responses for most of the identified project risks. Which of the following risk response planning techniques will you use to shift the impact of a threat to a third party, together with the responses?

Show Suggested Answer Hide Answer
Suggested Answer: D

Risk transference is a risk response planning technique that is used to shift the impact of a threat to a third party, together with the ownership of the response.

Risk response planning is a method of developing options to decrease the amount of threats and make the most of opportunities. The risk response should be aligned with the consequence of the risk and cost-effectiveness. This planning documents the processes for managing risk events. It addresses the owners and their responsibilities, risk identification, results from qualification and quantification processes, budgets and times for responses, and contingency plans. The various risk response planning techniques are as follows.

Risk acceptance. It indicates that the project team has decided not to change the project management plan to deal with a risk, or is unable to identify any other suitable response strategy.

Risk avoidance. It is a technique for a threat, which creates changes to the project management plan that are meant to either eliminate the risk or to protect the project objectives from this impact.

Risk mitigation. It is a list of specific actions being taken to deal with specific risks associated with the threats and seeks to reduce the probability of occurrence or impact of risk below an acceptable threshold.

Risk transference. It is used to shift the impact of a threat to a third party, together with the ownership of the response.


Contribute your Thoughts:

0/2000 characters
Lonna
4 months ago
I thought risk acceptance was the way to go, but maybe not here.
upvoted 0 times
...
Julian
4 months ago
Risk mitigation is more proactive, right?
upvoted 0 times
...
Lynelle
4 months ago
Wait, can we really just pass the risk off like that?
upvoted 0 times
...
Clare
4 months ago
Totally agree, shifting it to a third party makes sense!
upvoted 0 times
...
Karan
5 months ago
I think it's D, risk transference.
upvoted 0 times
...
Bulah
5 months ago
I feel like risk acceptance is more about acknowledging the risk without action, so it can't be the right choice here. Transference seems to be the best fit.
upvoted 0 times
...
Felicitas
5 months ago
I’m a bit confused between risk transference and risk avoidance. I know transference involves passing the risk, but avoidance seems like it could fit too.
upvoted 0 times
...
Robt
5 months ago
I remember practicing a question similar to this, and I think risk mitigation was more about reducing the impact rather than transferring it.
upvoted 0 times
...
Jesusita
5 months ago
I think the answer might be risk transference since it involves shifting the impact to a third party, but I'm not completely sure.
upvoted 0 times
...
Dortha
5 months ago
Hmm, I'm a bit unsure about this one. I know there are a few different ways to build container images, but I can't remember the exact command off the top of my head. I'll have to think this through carefully.
upvoted 0 times
...
Kerry
5 months ago
This question seems pretty straightforward. I'm pretty confident I can figure this out.
upvoted 0 times
...
Dominque
5 months ago
I think I remember that only dedicated clusters have specific encryption support, but I'm not entirely confident if it's just KMS or other methods too.
upvoted 0 times
...
Peggie
5 months ago
I'm a little confused by this question. The Nmap results don't seem to be directly relevant to the answer choices. I'll have to review my notes on penetration testing tools and techniques to figure this one out.
upvoted 0 times
...
Veronique
5 months ago
I'm a bit confused on this one. I know File Persona is for file-based storage, but I'm not sure exactly which objects are required. I'll need to review the material on File Persona features before I can confidently answer this.
upvoted 0 times
...
Carlton
5 months ago
I'm not sure about this one. The wording is a bit tricky, and I want to make sure I'm not missing any key details. I'll need to re-read the question carefully.
upvoted 0 times
...

Save Cancel