New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ServiceNow CIS-RCI Exam - Topic 2 Question 40 Discussion

Actual exam question for ServiceNow's CIS-RCI exam
Question #: 40
Topic #: 2
[All CIS-RCI Questions]

For a particular risk assessment methodology (RAM), the control effectiveness score is calculated based on an individual assessment of controls. What are options for control identification? (Choose three.)

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Ryan
4 months ago
I’m not sure about using indicator results for control identification.
upvoted 0 times
...
Soledad
4 months ago
Totally agree with A and B!
upvoted 0 times
...
Mitsue
5 months ago
Wait, can you really identify controls ad-hoc? Seems risky.
upvoted 0 times
...
Mendy
5 months ago
I think E makes sense too.
upvoted 0 times
...
Krystina
5 months ago
A and C are solid options!
upvoted 0 times
...
Lizbeth
5 months ago
I’m a bit confused about whether ad-hoc identification counts separately from library identification. Can they be chosen together?
upvoted 0 times
...
Verlene
5 months ago
I feel like we practiced a question similar to this, and I think identifying controls from indicator results was mentioned as a valid option.
upvoted 0 times
...
Ivan
5 months ago
I think controls can definitely be identified from related issues, but I can't recall if that's one of the three choices.
upvoted 0 times
...
Lenna
5 months ago
I remember we discussed how controls can be identified from both libraries and ad-hoc methods, but I'm not sure if both are options here.
upvoted 0 times
...
Tess
5 months ago
I'm pretty confident about this one. CIFS is a Windows file sharing protocol, so I'll select option D.
upvoted 0 times
...
Tambra
5 months ago
This is a good example of the types of agency issues we've been covering. I'll methodically work through the facts and legal principles to arrive at the right conclusion.
upvoted 0 times
...
Desmond
5 months ago
Hmm, the question is a bit confusing. I'm not sure exactly what they're looking for in terms of "hackers" and "interfering" devices.
upvoted 0 times
...
Rima
6 months ago
This seems like a straightforward security question. I'll carefully read through the options and think about the safest approach.
upvoted 0 times
...
Adela
10 months ago
Alright, let's think this through. A, C, and D cover the bases for control identification. Can't go wrong with that, right? Except maybe the library is dusty and the ad-hoc controls are held together with duct tape.
upvoted 0 times
Annamaria
9 months ago
D) Controls are identified ad-hoc
upvoted 0 times
...
Minna
9 months ago
C) Controls are identified from library
upvoted 0 times
...
Donte
9 months ago
A) Controls are identified from library and ad-hoc
upvoted 0 times
...
...
Brock
10 months ago
Haha, this reminds me of that time my boss asked me to identify controls from his crystal ball. Joke's on him, I don't even have one!
upvoted 0 times
Olive
9 months ago
E) Controls are identified from related issues
upvoted 0 times
...
Juan
9 months ago
B) Controls are identified from indicator results
upvoted 0 times
...
Nobuko
9 months ago
A) Controls are identified from library and ad-hoc
upvoted 0 times
...
...
Apolonia
11 months ago
Wait, why can't I choose B and E? Shouldn't we also consider controls from indicator results and related issues? This question is tricky.
upvoted 0 times
Chana
9 months ago
B) Controls are identified from indicator results
upvoted 0 times
...
Cassie
9 months ago
D) Controls are identified ad-hoc
upvoted 0 times
...
Stephania
9 months ago
C) Controls are identified from library
upvoted 0 times
...
Steffanie
9 months ago
A) Controls are identified from library and ad-hoc
upvoted 0 times
...
Antonio
9 months ago
You're right, the question specifically asked for options for control identification. That's why B and E are not included.
upvoted 0 times
...
Genevieve
9 months ago
D) Controls are identified ad-hoc
upvoted 0 times
...
Asuncion
9 months ago
C) Controls are identified from library
upvoted 0 times
...
Dolores
9 months ago
D) Controls are identified ad-hoc
upvoted 0 times
...
Grover
10 months ago
C) Controls are identified from library
upvoted 0 times
...
Georgene
10 months ago
A) Controls are identified from library and ad-hoc
upvoted 0 times
...
Robt
10 months ago
A) Controls are identified from library and ad-hoc
upvoted 0 times
...
...
Jackie
11 months ago
I believe controls can also be identified from related issues, so option E should be considered as well.
upvoted 0 times
...
Arlette
11 months ago
I think the correct options are A, C, and D. Identifying controls from a library and ad-hoc makes sense for a risk assessment methodology.
upvoted 0 times
Alisha
10 months ago
It's important to have a mix of control identification methods to ensure a comprehensive risk assessment.
upvoted 0 times
...
Veronika
10 months ago
I prefer controls identified from indicator results, they provide more specific information.
upvoted 0 times
...
Magdalene
10 months ago
I think controls identified from related issues can also be helpful in the process.
upvoted 0 times
...
Fletcher
10 months ago
I think controls identified from related issues could also be useful in certain situations.
upvoted 0 times
...
Magdalene
10 months ago
I agree, controls from a library and ad-hoc are important for a risk assessment methodology.
upvoted 0 times
...
Elke
11 months ago
I agree, controls from a library and ad-hoc are important for a risk assessment methodology.
upvoted 0 times
...
...
Curtis
11 months ago
I agree with Latia, controls can be identified from library, ad-hoc, and indicator results.
upvoted 0 times
...
Latia
11 months ago
I think options A, C, and D are possible for control identification.
upvoted 0 times
...

Save Cancel