From OSG, pg. 726.
Security Assessments
Security assessments are comprehensive reviews of the security of a system, application,
or other tested environment. During a security assessment, a trained information security
professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed.
Answer: D. To discover unmitigated security vulnerabilities, and propose paths for mitigating them
ISC2 WILEY CISSP STUDY GUIDE GLOSSARY pg 184
security assessments Comprehensive reviews of the security of a system, application, or other tested environment. During a security assessment, a trained information security professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed.
B - Security assessment and testing programs perform regular checks to ensure that adequate security controls are in place and that they effectively perform their assigned functions. In this chapter, you'll learn about many of the assessment and testing controls used by security professionals around the world.
Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 725). Wiley. Kindle Edition.
While all of the options listed are important goals of conducting security assessments, the most important goal is to identify and address security vulnerabilities that could be exploited by attackers. This helps to improve the overall security posture of the organization and reduce the risk of a successful cyber attack. The other goals listed are also important, but they are secondary to the primary goal of identifying and mitigating security vulnerabilities.
D. B talks about reporting to management, which in my CISSP class was stressed as a top priority, but the answer states that it is to demonstrate the effectiveness of controls. What if the controls are not effective?
It seems that we would scan and assess the environment to find problems and the CISSP is supposed to advise on solutions, so I go with that one. The wording of B seems to indicate a specific outcome, and in the CISSP class I was advised to avoid specific answers.
The most important goal of conducting security assessments is to identify and mitigate potential security risks and vulnerabilities within an organization's information systems and networks. A security assessment is a comprehensive evaluation of an organization's security posture, which includes assessing security policies, procedures, and technical controls.
By conducting security assessments, organizations can identify weaknesses in their security posture and take proactive measures to address them. This includes implementing new security controls, improving existing controls, and providing security training and awareness programs for employees.
Security assessments include many types of tests designed to identify vulnerabilities, and
the assessment report normally includes recommendations for mitigation. The assessment
does not, however, include actual mitigation of those vulnerabilities
During a security assessment, a trained information security
professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed. OSG Pg-726
In the ISC2 CISSP study Guide, page 726, 'The main work product of a security assessment is normally an assessment report addressed to management that contains the results of the assessment in nontechnical language and concludes with specific recommendations for improving the security of the tested environment.'
This section is not available anymore. Please use the main Exam Page.CISSP Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Humongous1593
Highly Voted 2 years, 7 months agojackdryan
2 years agoBigITGuy
Most Recent 1 month, 2 weeks agoBietchasup
5 months, 2 weeks agoMayyada
7 months, 2 weeks agojohn_boogieman
1 year, 1 month agoklarak
1 year agodm808
1 year, 1 month agoGuardianAngel
1 year, 3 months agoGPrep
1 year, 4 months agoSoleandheel
1 year, 5 months agolxm28
1 year, 11 months agoHughJassole
1 year, 11 months agoDelab202
2 years, 1 month agoErnestokoro
2 years, 1 month agoJohnyDal
2 years, 3 months agoDee83
2 years, 3 months agoJohnyDal
2 years, 3 months agoRVoigt
2 years, 4 months ago