A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded.
Which of the following should be used to identify weak processes and other vulnerabilities?
A. Gap analysis
B. Benchmarks and baseline results
C. Risk assessment
D. Lessons learned report
How to PASS CAS-004 in First Attempt?FULL Printable PDF and Software. VALID exam to help you PASS. |
So the correct answer is D: Lessons Learned Report???
One approach for risk assessment is to use project lessons learned to populate your risk register or guide brainstorming for future projects. So lessons learned reports are used to identify what went wrong (weak processes for ex.) if vulnerabilities were present, etc cause these input will help populate risk assessment and prepare better for future CRM upgrades. So D.
Lessons learned is part of incident response. This is not incident response. I regret studying for this exam, using terms interchangeably like this is exactly why we have problems in the field. CompTIA failed big time to provide proper course materials for the test. I think it’s A, but none of us seem to be on the same page. All I know is that D should not be the answer here, insane.
D is correct.
D doesn’t make senses here
its either C or B
But C: look is the correct answer
any thoughts?
D
C??
Thinking more about it… Maybe it is C
risk assessment – A tool used in risk management to identify vulnerabilities and threats, assess
the impact of those vulnerabilities and threats, and determine which controls to implement.
No where does it mention vulnerabilities other than technical difficulties. A lessons learned report will allow you to discuss what what right and what went wrong so that the next project is handled even better. This should limit the amount of mistakes when upgrading the next office.
LOL it does mention vulnerabilities tho
Which of the following should be used to identify weak processes and other vulnerabilities?
i have to agree with C