Which of the following should be used to identify weak processes and other vulnerabilities?

A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded.
Which of the following should be used to identify weak processes and other vulnerabilities?
A. Gap analysis
B. Benchmarks and baseline results
C. Risk assessment
D. Lessons learned report

How to PASS CAS-004 in First Attempt?

FULL Printable PDF and Software. VALID exam to help you PASS.

comptia-exams

10 thoughts on “Which of the following should be used to identify weak processes and other vulnerabilities?

    1. One approach for risk assessment is to use project lessons learned to populate your risk register or guide brainstorming for future projects. So lessons learned reports are used to identify what went wrong (weak processes for ex.) if vulnerabilities were present, etc cause these input will help populate risk assessment and prepare better for future CRM upgrades. So D.

    2. Lessons learned is part of incident response. This is not incident response. I regret studying for this exam, using terms interchangeably like this is exactly why we have problems in the field. CompTIA failed big time to provide proper course materials for the test. I think it’s A, but none of us seem to be on the same page. All I know is that D should not be the answer here, insane.

    1. Thinking more about it… Maybe it is C

      risk assessment – A tool used in risk management to identify vulnerabilities and threats, assess
      the impact of those vulnerabilities and threats, and determine which controls to implement.

      1. No where does it mention vulnerabilities other than technical difficulties. A lessons learned report will allow you to discuss what what right and what went wrong so that the next project is handled even better. This should limit the amount of mistakes when upgrading the next office.

        1. LOL it does mention vulnerabilities tho
          Which of the following should be used to identify weak processes and other vulnerabilities?
          i have to agree with C

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.