exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 509 discussion

Actual exam question from Isaca's CISM
Question #: 509
Topic #: 1
[All CISM Questions]

A penetration test was conducted by an accredited third party. Which of the following should be the information security manager's FIRST course of action?

  • A. Request funding needed to resolve the top vulnerabilities.
  • B. Ensure a risk assessment is performed to evaluate the findings.
  • C. Report findings to senior management.
  • D. Ensure vulnerabilities found are resolved within acceptable timeframes.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Thavee
8 months, 2 weeks ago
Selected Answer: C
C. Report findings to senior management has a higher priority.
upvoted 1 times
...
xcjxcj
10 months, 1 week ago
Selected Answer: B
For those chatgpt lover, below is also from chatgpt: Penetration result should be report to senior management directly without information security manager assessment Reporting penetration test results directly to senior management without the assessment of the information security manager could be risky. The information security manager typically has a deep understanding of the organization's security posture, its vulnerabilities, and its risk tolerance. Their assessment is valuable in interpreting the penetration test results accurately and providing context to senior management. Excluding the information security manager from this process could lead to misunderstandings or misinterpretations of the results.
upvoted 2 times
...
CISSPST
1 year, 3 months ago
Selected Answer: B
Reporting the findings of a test conducted by a 3rd party, accredited or not, to the senior management, without ascertaining them is hasty. Afterall, Pentesters have a tunnel vision; they are highly technical and do not take the business perspective into consideration. Reviewing the findings with business owners, or as in our case, evaluating the findings through risk assessment is important.
upvoted 2 times
...
wickhaarry
1 year, 3 months ago
B. Ensure a risk assessment is performed to evaluate the findings. Most Voted
upvoted 1 times
...
koala_lay
1 year, 3 months ago
Selected Answer: B
The information security manager to prioritize option B: Ensure a risk assessment is performed to evaluate the findings as their first course of action. A risk assessment is crucial to understand the impact and likelihood of the vulnerabilities identified during the penetration test. It helps in determining the potential risks and prioritizing them based on their severity and potential impact on the organization's security posture. Once the risk assessment is performed, the information security manager can then proceed with other actions such as reporting findings to senior management, requesting funding, and ensuring vulnerabilities are resolved within acceptable timeframes. However, without a proper understanding of the risks associated with the vulnerabilities, these actions may not be prioritized effectively.
upvoted 2 times
...
Cert_IT
1 year, 3 months ago
Selected Answer: C
C. Report findings to senior management. The first course of action for the information security manager after a penetration test conducted by an accredited third party should be to report the findings to senior management. This step is crucial because it provides transparency and ensures that the organization's leadership is aware of the security vulnerabilities and risks identified during the penetration test. Once senior management is informed, they can make informed decisions about how to proceed, which may include: Allocating funding (option A) to address the identified vulnerabilities. Initiating a risk assessment (option B) to evaluate the findings in more detail. Establishing priorities for resolving vulnerabilities (option D) within acceptable timeframes. However, it's essential to start by reporting the findings to senior management so that they can be involved in the decision-making process and provide the necessary support and resources for addressing security issues.
upvoted 1 times
...
oluchecpoint
1 year, 3 months ago
Selected Answer: C
C. Report findings to senior management. Reporting the findings to senior management is essential because it ensures that the highest levels of the organization are aware of the security vulnerabilities and risks identified during the penetration test. This allows senior management to make informed decisions about allocating resources, prioritizing actions, and setting the overall direction for addressing the security issues identified. Once senior management is informed, subsequent actions such as requesting funding, conducting a risk assessment, and resolving vulnerabilities can be coordinated and prioritized based on their strategic importance to the organization.
upvoted 1 times
...
Goseu
1 year, 5 months ago
Selected Answer: C
I would say C . Nobody does or recommends a RA after a pen test. Pen test already has the details needed.
upvoted 2 times
xcjxcj
10 months, 1 week ago
In my company, pentest result must be reviewed before report to senior management, to validate the business relevance. Recommendation must be customized before submit. If C is correct, a generated report can conclude, why we persue CISM, our existence has a reason.
upvoted 1 times
...
Goseu
1 year, 5 months ago
In addition ,After a pen test , we talk about vulnerabilities not potential risks.
upvoted 1 times
...
...
richck102
1 year, 6 months ago
B. Ensure a risk assessment is performed to evaluate the findings.
upvoted 2 times
...
ddharia94
1 year, 6 months ago
If a pen test is done by a dependable accredited third party - why would you need to repeat a risk assessment - isint their study / analysis considered concrete?
upvoted 1 times
45
1 year, 6 months ago
Because you would want to validate that on how those findings impact your organization. Based on the risk assessment you can then determine the appropriate security measures to prevent further findings.
upvoted 1 times
...
...
wello
1 year, 6 months ago
Selected Answer: B
B. Ensure a risk assessment is performed to evaluate the findings. We need to evaluate the findings to determine the criticality and countermeasures.
upvoted 1 times
...
mad68
1 year, 7 months ago
Selected Answer: C
C. Report findings to senior management. Reporting the findings to senior management is the first step that should be taken after a penetration test. It is crucial to inform senior management about the results, including the identified vulnerabilities and potential risks to the organization's information security. This allows management to have a clear understanding of the current security posture and make informed decisions regarding risk mitigation and resource allocation.
upvoted 1 times
...
dark_3k03r
1 year, 8 months ago
Selected Answer: B
The correct answer is (B) Ensure a risk assessment is performed to evaluate the findings. Cause without validating the results any actions that comes next would lead to some erroneous actions/results. Rationale: (A) it's not A cause funding should only be asked for once we know the results from the pentest are valid and need to be acted against based on the org risk appetite of the findings. (C) Reporting to management without validating the results is not a smart idea as it can call one's judgment into question. (D) The question is whether these need to be addressed in the first place and in what order. without doing a risk assessment step D is premature.
upvoted 2 times
...
Souvik124
1 year, 10 months ago
The information security manager's FIRST course of action after a penetration test should be to report the findings to senior management. This is because senior management needs to be aware of the risks that have been identified and the potential impact of those risks on the organization. From there, the information security manager can work with management to determine the appropriate course of action, which may include requesting funding, performing a risk assessment, or resolving vulnerabilities within acceptable timeframes.
upvoted 2 times
...
D2D2
2 years ago
Selected Answer: B
B is correct
upvoted 2 times
...
EZPASS
2 years, 1 month ago
Selected Answer: B
I think B is the correct answer.
upvoted 2 times
...
Ziggybooboo
2 years, 2 months ago
I'm confused, we don't have faith in what the 3rd party reports from the pen test?
upvoted 3 times
6and0
1 year, 3 months ago
Risk Assessment would evaluates potential risks and threats that could disrupt operations and assess the likelihood and impact. Validating the 3rd parties finding.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...