ExamQuestions.com

Register
Login
Certified Information Security Manager Exam Questions

Isaca

Certified Information Security Manager

288 / 500

Question 288:

An organization has a process in place that involves the use of a vendor. A risk assessment was completed during the development of the process. A year after the implementation a monetary decision has been made to use a different vendor. What, if anything, should occur? 

Answer options:

A. Nothing, since a risk assessment was completed during development.
B. A vulnerability assessment should be conducted.
C. A new risk assessment should be performed.
D. The new vendor`s SAS 70 type II report should be reviewed.