exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 256 discussion

Actual exam question from Isaca's CISM
Question #: 256
Topic #: 1
[All CISM Questions]

Which of the following processes can be used to remediate identified technical vulnerabilities?

  • A. Updating the business impact analysis (BIA)
  • B. Performing penetration testing
  • C. Enforcing baseline configurations
  • D. Conducting a risk assessment
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Prat1597
1 week, 3 days ago
Selected Answer: D
I think the answer should be D. The question is talking about "Identified" threats which mostly means that these are the threats that were identified after installing baseline configurations.
upvoted 1 times
...
e891cd1
9 months, 1 week ago
D.. If the vulnerability has been "identified" wouldnt a risk assessment be more reasonable than " enforcing baseline configuration"? when you add "identified" it makes me think we need a risk assessment to ensure that appropriate and effective controls are implemented.
upvoted 1 times
...
AlexJacobson
11 months, 3 weeks ago
Selected Answer: C
Key words "technical" and "remediate", so C.
upvoted 1 times
...
Learner76
1 year ago
Selected Answer: C
C - Make more sense as it standardized system configuration. Can't see how this is related to BIA.
upvoted 1 times
...
oluchecpoint
1 year, 4 months ago
C. Enforcing baseline configurations Enforcing baseline configurations involves ensuring that all systems and devices within an organization are configured according to a predetermined standard or baseline. This helps in reducing vulnerabilities by eliminating misconfigurations and ensuring that security settings are aligned with best practices.
upvoted 3 times
oluchecpoint
1 year, 4 months ago
Reason why answer A is not selected is that updating the business impact analysis (BIA) is related to understanding the impact of disruptions to business operations and is not a direct remediation process for technical vulnerabilities.
upvoted 2 times
...
...
Sammy65
1 year, 5 months ago
C: se trata de remediar. Un BIA da las pautas de que se debe remediar , no es remediación.
upvoted 1 times
...
richck102
1 year, 7 months ago
C. Enforcing baseline configurations
upvoted 1 times
...
Abhey
1 year, 8 months ago
Selected Answer: C
Enforcing baseline configurations is a process that can be used to remediate identified technical vulnerabilities
upvoted 3 times
...
jaiz
1 year, 10 months ago
Selected Answer: C
Agree with C
upvoted 3 times
...
MyKasala
2 years ago
Selected Answer: C
C is correct
upvoted 3 times
...
baranikumar_v
2 years ago
C. Enforcing baseline configurations
upvoted 1 times
...
trev0r
2 years, 2 months ago
I agree: C
upvoted 3 times
...
Matini
2 years, 3 months ago
I think C is the correct answer here
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...