exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 854 discussion

Actual exam question from Isaca's CISM
Question #: 854
Topic #: 1
[All CISM Questions]

Which of the following is MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application?

  • A. A patch management process
  • B. Change management controls
  • C. Version control
  • D. Logical access controls
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Salilgen
10 months, 2 weeks ago
Selected Answer: B
The verb "introduce" leads us to think about change
upvoted 1 times
...
sundersam23
1 year, 6 months ago
Selected Answer: B
Among the options provided, B. Change management controls are MOST effective in preventing the introduction of vulnerabilities that may disrupt the availability of a critical business application. While options A (patch management process), C (version control), and D (logical access controls) are important security measures, they are not specifically focused on preventing the introduction of vulnerabilities that disrupt the availability of critical business applications. Patch management and version control primarily address software updates and versioning, while logical access controls focus on controlling user access to systems and data.
upvoted 3 times
...
CISSPST
1 year, 6 months ago
The most likely answer is B, Change Management Controls. Note that the question is specifically referring to the 'introduction' of vulnerabilities, which most often happens when changes are made to the system without a proper change management process in place. A change management process can include patch management to fix the vulnerabilities introduced. Version control is part of change management. Access control is used to reduce the likelihood of a threat (an attacker gaining access to a critical system) rather than mitigate a vulnerability (the critical system itself need not have any vulnerability).
upvoted 3 times
...
richck102
1 year, 6 months ago
B. Change management controls
upvoted 1 times
...
szopenowa
1 year, 7 months ago
Selected Answer: A
I would suggest A
upvoted 1 times
chanke
1 year, 7 months ago
Change management will include patch management and configuration management in addition to making sure the changes are documented and approved before releasing into production. The answer is more so B. Change management.
upvoted 4 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...