exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 381 discussion

Actual exam question from ISC's CISSP
Question #: 381
Topic #: 1
[All CISSP Questions]

What is the MOST important goal of conducting security assessments?

  • A. To align the security program with organizational risk appetite
  • B. To demonstrate proper function of security controls and processes to senior management
  • C. To prepare the organization for an external audit, particularly by a regulatory entity
  • D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Humongous1593
Highly Voted 2 years, 7 months ago
Its asking for the MOST important. The point is to identify vulns. D
upvoted 9 times
jackdryan
2 years ago
D is correct
upvoted 2 times
...
...
BigITGuy
Most Recent 1 month, 2 weeks ago
Selected Answer: D
Can't be B. Demonstrating proper function is a secondary benefit, not the main goal.
upvoted 1 times
...
Bietchasup
5 months, 2 weeks ago
Selected Answer: D
Sybex 10th Edition pg 731
upvoted 1 times
...
Mayyada
7 months, 2 weeks ago
If you think like a CISO then the answer is A
upvoted 3 times
...
john_boogieman
1 year, 1 month ago
Selected Answer: D
From OSG, pg. 726. Security Assessments Security assessments are comprehensive reviews of the security of a system, application, or other tested environment. During a security assessment, a trained information security professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed.
upvoted 3 times
klarak
1 year ago
Well done. Thanks!
upvoted 1 times
...
...
dm808
1 year, 1 month ago
Selected Answer: B
If you think like a manager then the answer is B.. If you think like a technician then it's D..
upvoted 2 times
...
GuardianAngel
1 year, 3 months ago
Answer: D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them ISC2 WILEY CISSP STUDY GUIDE GLOSSARY pg 184 security assessments Comprehensive reviews of the security of a system, application, or other tested environment. During a security assessment, a trained information security professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed.
upvoted 2 times
...
GPrep
1 year, 4 months ago
Selected Answer: B
B - Security assessment and testing programs perform regular checks to ensure that adequate security controls are in place and that they effectively perform their assigned functions. In this chapter, you'll learn about many of the assessment and testing controls used by security professionals around the world. Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 725). Wiley. Kindle Edition.
upvoted 1 times
...
Soleandheel
1 year, 5 months ago
D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them.
upvoted 1 times
...
lxm28
1 year, 11 months ago
Selected Answer: D
While all of the options listed are important goals of conducting security assessments, the most important goal is to identify and address security vulnerabilities that could be exploited by attackers. This helps to improve the overall security posture of the organization and reduce the risk of a successful cyber attack. The other goals listed are also important, but they are secondary to the primary goal of identifying and mitigating security vulnerabilities.
upvoted 1 times
...
HughJassole
1 year, 11 months ago
D. B talks about reporting to management, which in my CISSP class was stressed as a top priority, but the answer states that it is to demonstrate the effectiveness of controls. What if the controls are not effective? It seems that we would scan and assess the environment to find problems and the CISSP is supposed to advise on solutions, so I go with that one. The wording of B seems to indicate a specific outcome, and in the CISSP class I was advised to avoid specific answers.
upvoted 3 times
...
Delab202
2 years, 1 month ago
Selected Answer: D
The most important goal of conducting security assessments is to identify and mitigate potential security risks and vulnerabilities within an organization's information systems and networks. A security assessment is a comprehensive evaluation of an organization's security posture, which includes assessing security policies, procedures, and technical controls. By conducting security assessments, organizations can identify weaknesses in their security posture and take proactive measures to address them. This includes implementing new security controls, improving existing controls, and providing security training and awareness programs for employees.
upvoted 1 times
...
Ernestokoro
2 years, 1 month ago
Security assessments include many types of tests designed to identify vulnerabilities, and the assessment report normally includes recommendations for mitigation. The assessment does not, however, include actual mitigation of those vulnerabilities
upvoted 1 times
...
JohnyDal
2 years, 3 months ago
I'd think B is more aligned with "Internal audit." D is more aligned with security assessments
upvoted 1 times
...
Dee83
2 years, 3 months ago
D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them
upvoted 1 times
...
JohnyDal
2 years, 3 months ago
Selected Answer: D
During a security assessment, a trained information security professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed. OSG Pg-726
upvoted 1 times
...
RVoigt
2 years, 4 months ago
Selected Answer: B
In the ISC2 CISSP study Guide, page 726, 'The main work product of a security assessment is normally an assessment report addressed to management that contains the results of the assessment in nontechnical language and concludes with specific recommendations for improving the security of the tested environment.'
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago