An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial draft of the audit report. Which of the following findings should be ranked as the HIGHEST risk?
A.
Network penetration tests are not performed.
B.
The network firewall policy has not been approved by the information security officer.
C.
Network firewall rules have not been documented.
An incomplete inventory hampers visibility and management. It can lead to unpatched devices, unauthorized access, and security blind spots.
Remember that risk assessment considers both likelihood and impact. In this case, the incomplete inventory poses immediate operational and security risks.
D is the accurate answer. Without a complete inventory of the network in an enterprise, you won’t be able to assess the risk. This is the highest risk then the B comes
A. Network penetration tests are not performed – This poses the highest risk because penetration testing is a critical control for identifying exploitable vulnerabilities in a live network environment. Without it, the organization may be unaware of serious security flaws that could lead to unauthorized access, data breaches, or service disruption. This represents a direct threat to the organization's security posture.
Comparisons:
B. Firewall policy not approved by the information security officer – This is a governance/control issue, but it doesn't directly expose the network to threats like missing penetration tests do.
C. Firewall rules not documented – This weakens change management and troubleshooting, but again, it is less risky than not actively testing for vulnerabilities.
D. Incomplete network device inventory – Important for security and asset management, but this is a supporting control. The lack of penetration testing has a more immediate and severe impact on risk exposure.
D. The network device inventory is incomplete is a concern, it is not as critical as the absence of penetration testing for the following reasons:
A (No Network Penetration Tests):
This is a direct security control failure, leaving the organization blind to vulnerabilities that attackers could exploit.
Without penetration testing, serious issues like open ports, weak passwords, and unpatched systems may go undetected.
Penetration testing actively validates the security posture, which is crucial for identifying real-world attack vectors.
D (Incomplete Network Device Inventory):
This is a secondary control failure, affecting asset management and risk visibility.
While important, an inventory issue is less immediately exploitable than untested security vulnerabilities.
Penetration testing can still uncover vulnerable devices, even if the inventory is incomplete.
The absence of a properly approved network firewall policy poses a significant risk because it indicates a lack of formal oversight, accountability, and governance. An unapproved policy may result in misconfigurations or improper firewall rules, which can compromise the entire security infrastructure, allowing potential attackers to exploit vulnerabilities and gain unauthorized access.
Answer: C
While the other findings (network penetration tests not performed, firewall policy not approved by the information security officer, incomplete network device inventory) also represent potential risks to network security, the absence of documented firewall rules is particularly concerning due to its direct impact on the configuration and management of network security controls. Therefore, it should be ranked as the highest risk in the audit report.
By not performing penetration tests, the organization is leaving itself blind to potential security weaknesses that could be exploited by malicious actors. This represents a significant risk to the confidentiality, integrity, and availability of sensitive data.
The perfect answer would have be B(approval by an info sec officer) but looking at the context of the question “fieldwork phase” has been completed, I think D would be a better option
B. The network firewall policy has not been approved by the information security officer.
The fact that the network's firewall policy has not been approved by the information security officer indicates a lack of control and governance over the network's security settings. This can result in greater vulnerability to attacks and a greater likelihood of security breaches. The lack of approval of the firewall policy can indicate that the security rules have not been established properly and the established security standards are not being followed. This represents a significant risk to the integrity and confidentiality of network data.
It is important to note that the risk classification may vary depending on the context and the specific circumstances of the audited organization. Therefore, it is recommended that the IS auditor perform a full evaluation of the findings and consider other relevant factors before finalizing the highest risk classification.
The approval of the network firewall policy by the information security officer is crucial for ensuring that the organization's network security measures align with established standards, guidelines, and best practices. Without the approval of the information security officer, there is a higher risk of inadequate or ineffective firewall configurations, which can leave the network vulnerable to unauthorized access and potential security breaches.
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dan08
Highly Voted 10 months, 1 week agoRachy
Highly Voted 11 months, 4 weeks agoGreens
Most Recent 1 week, 2 days ago52cb16c
3 weeks, 3 days agocisastudy567
3 months, 3 weeks agoSayakSib
4 months, 1 week ago1Naa
6 months, 1 week agoa84n
8 months ago5b56aae
8 months, 1 week agoSwallows
8 months, 3 weeks agoTef_corp
9 months agozzh52est
10 months agonecoll007
1 year, 5 months agoCISAGuate22
1 year, 6 months agoTTH1019
1 year, 6 months agochun2k23
1 year, 7 months ago007Georgeo
1 year, 7 months ago