(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


Which analysis characterizes the contingency requirements of an information system?

  1. Business Impact Analysis

  2. Risk Assessment

  3. Security Audit

  4. Compliance Review

The correct answer is: Business Impact Analysis

The correct answer is the Business Impact Analysis. This analysis focuses on identifying the effects of disruption to business operations resulting from unforeseen events, such as natural disasters, cyberattacks, or system failures. It evaluates the criticality of different functions within an organization, assessing how their disruption impacts the overall business objectives. Through this process, organizations can determine the necessary contingency requirements, including recovery time objectives (RTO) and recovery point objectives (RPO), which help define how quickly the business can maintain or restore operations after an incident. By understanding these impacts, organizations can prioritize resources and implement effective strategies to mitigate risks, ensuring that vital operations remain resilient in the face of challenges. In contrast, risk assessments are broader in scope, focusing on identifying, evaluating, and prioritizing risks across the entire organization, while security audits examine the effectiveness of existing security controls and compliance reviews assess adherence to relevant laws and regulations. These analyses serve different purposes and inform different aspects of an organization's security strategy but don't specifically characterize the contingency requirements of an information system as effectively as a Business Impact Analysis.