Hello.
I took the quiz and for number 3, I don't believe that it is a well written question as it is open ended and could have multiple partially correct answers.
Based on the actual question (9) I can see why you might pick C. Personally have an issue with this question.
There are four common risk mitigation strategies. Typically the most common include avoidance, reduction, transference, and acceptance. There are others (risk sharing, risk buffering, etc.) The question actually lists transference, acceptance and avoidance as distractors
I believe the question needs to be reviewed and maybe rewritten.
mhoo
d
I think in the first one we need to revert to the syllabus.
If, as you assume, it's a clumsy reference to access controls, then there are two points to be made:
- First, access controls as described in the answer, only addresses threats from external actors, not insider threats.
- Second, the response I made is the definition of Integrity (According to the exam itself, in another question it asked what the definition of integrity was, I answered this, and the answer was marked correct.) So if I revert to ISC2's definition of Integrity, according to ISC2's CISSP Exam Study Guide, 9th edition, page 6
"Integrity can be examined from 3 perspectives:
1 - Preventing unauthorised subjects from making changes.
2 - Preventing authorised subjects from making unauthorised changes.
3 - Maintaining internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any other object is valid, consistent and verifiable"
If we consider perspective 1, this matches with the authorisation requirement in answer c) given by ISC2 as the correct answer.
If we consider perspective 2, this surpasses the answer given by ISC2 by adding additional controls on authorised users, therefore b) is the better answer because it includes any controls in answer c) and additional controls.
I did some research after posting this, and I agree with your conclusion about the Risk Management question, especially since "Risk capture" is not a recognised Risk Management process.