(ISC)2(ISC)2
CERTIFIED-IN-CYBERSECURITY · Question #598
CERTIFIED-IN-CYBERSECURITY Question #598: Real Exam Question with Answer & Explanation
The correct answer is A: To establish a risk acceptance threshold. To establish a risk acceptance threshold. A risk assessment is conducted to identify and evaluate potential risks, determine their potential impact, and establish a risk acceptance threshold to guide decision-making in managing those risks.
Security Principles
Question
What is the purpose of a risk assessment in information security?
Options
- ATo establish a risk acceptance threshold
- BTo ensure compliance with regulations
- CTo identify vulnerabilities in systems
- DTo eliminate all risks
Explanation
To establish a risk acceptance threshold. A risk assessment is conducted to identify and evaluate potential risks, determine their potential impact, and establish a risk acceptance threshold to guide decision-making in managing those risks.
Topics
#Risk Assessment#Risk Management#Information Security#Risk Acceptance
Community Discussion
No community discussion yet for this question.