Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISSP topic 1 question 359 discussion

Actual exam question from ISC's CISSP
Question #: 359
Topic #: 1
[All CISSP Questions]

Which of the following vulnerability assessment activities BEST exemplifies the Examine method of assessment?

  • A. Asking the Information System Security Officer (ISSO) to describe the organization's patch management processes
  • B. Ensuring that system audit logs capture all relevant data fields required by the security controls baseline
  • C. Logging into a web server using the default administrator account and a default password
  • D. Performing Port Scans of selected network hosts to enumerate active services
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
maawar83
3 months, 4 weeks ago
Answer is C: Simplify the question... but reading it from CISSP Perspective. Exemplifies means (Provide an Example) of the examination method of the assessment... the vulnerability assessment will test the default credentials...
upvoted 1 times
...
YesPlease
4 months ago
Selected Answer: B
Answer B) Ensuring that system audit logs capture all relevant data fields required by the security controls baseline B is the only answer that is looking at something and making sure it contains exactly what is expected to see because of the policy in place for log data capture. A is INTERVIEW because it is only asking someone about a procedure C isn't really stating much other than it would be a security problem if they can log in with default credentials D is EXAMINE because they are trying something out to see what happens, but they do not have a specified expectation of what they will find. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf Page 10: The test method is the process of exercising one or more assessment objects (i.e., activities or mechanisms) under specified conditions to compare actual with expected behavior.
upvoted 2 times
...
Soleandheel
4 months, 1 week ago
B. Ensuring that system audit logs capture all relevant data fields required by the security controls baseline B = Examine, A = interview, C & D = test,
upvoted 1 times
...
bluerock2k
5 months, 3 weeks ago
A The other options involve activities like configuring, logging in, or performing scans, which are more aligned with the "Test" or "Operate" methods of assessment, rather than the "Examine" method.
upvoted 1 times
...
Dam0s
6 months, 2 weeks ago
Selected Answer: A
Chat G P T initially said A. I provided the definitions from the CBK and still thought it was A
upvoted 2 times
...
HughJassole
10 months, 3 weeks ago
D seems correct. It's not up to you to ensure logs capture data, that's not the CISSP's role. "Assessment methods define the nature of the assessor actions and include examine, interview, and test. The examine method is the process of reviewing, inspecting, observing, studying, or analyzing one or more assessment objects (i.e., specifications, mechanisms, or activities)." https://www.sciencedirect.com/topics/computer-science/assessment-method#:~:text=activities%20described%20above.-,Assessment%20methods%20define%20the%20nature%20of%20the%20assessor%20actions%20and,%2C%20mechanisms%2C%20or%20activities). A. would fall under the interview category, and scanning ports sounds like it fits the definition perfectly.
upvoted 1 times
...
Rama2023
11 months ago
The correct answer is A. Asking the Information System Security Officer (ISSO) to describe the organization's patch management processes. The Examine method of vulnerability assessment is a qualitative method that relies on the expertise of the assessor to identify vulnerabilities. This method is often used when it is not possible or practical to use quantitative methods, such as scanning or penetration testing.
upvoted 2 times
...
Ernestokoro
1 year, 1 month ago
Ans D:According to CISSP Official Guide 9th Edition, Page 833. Vulnerability assessments use automated tools to search for known vulnerabilities in systems, applications, and networks. So answer is D in my opinion looking at the automated tool which in this case is the Performance of port scan.
upvoted 2 times
jackdryan
11 months, 1 week ago
B is correct
upvoted 1 times
...
...
rajkamal0
1 year, 4 months ago
Selected Answer: B
I have checked the Imperva and NIST SP 800 Links. I agree with B as the correct answer for the examine method.
upvoted 1 times
...
Toa
1 year, 5 months ago
Selected Answer: D
Answer D It is assessment. Not audit or compliance https://www.imperva.com/learn/application-security/vulnerability-assessment/
upvoted 2 times
Toa
1 year, 5 months ago
Sorry Answer B after i go to below link
upvoted 2 times
...
...
sec_007
1 year, 6 months ago
Selected Answer: B
B is correct. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53Ar4.pdf Assessment methods define the nature of the assessor actions and include examine, interview, and test. The examine method is the process of reviewing, inspecting, observing, studying, or analyzing one or more assessment objects (i.e., specifications, mechanisms, or activities). The purpose of the examine method is to facilitate assessor understanding, achieve clarification, or obtain evidence. A is interview C & D are test.
upvoted 2 times
RVoigt
1 year, 2 months ago
The entire paragraph is "Assessment methods define the nature of the assessor actions and include examine, interview, and test. The examine method is the process of reviewing, inspecting, observing, studying, or analyzing one or more assessment objects (i.e., specifications, mechanisms, or activities). The purpose of the examine method is to facilitate assessor understanding, achieve clarification, or obtain evidence. The interview method is the process of holding discussions with individuals or groups of individuals within an organization to once again, facilitate assessor understanding, achieve clarification, or obtain evidence." While agree this could be an interview, it also could be reviewing activities. More strongly - patch management has to do with vulnerabilities. - A
upvoted 1 times
RVoigt
1 year, 1 month ago
I've been wrestling with this question for a while. After reading Appendix D of the NIST PDF B is absolutely the answer. A is an interview and D is actually the definition of Test - "Typical assessor actions may include, for example: testing access control, identification and authentication, and audit mechanisms; testing security configuration settings; testing physical access control devices; conducting penetration testing of key information system components; testing information system backup operations; testing incident response capability; and exercising contingency planning capability."
upvoted 2 times
liledag
1 year, 1 month ago
The answer is A The Examine method of assessment focuses on reviewing documentation, policies, and procedures to ensure that they are in place and followed correctly. Therefore, option B, which refers to ensuring that system audit logs capture all relevant data fields, would be a better fit for the Validate method of assessment, which focuses on ensuring that controls are implemented and operating effectively. Option A, which involves asking the ISSO to describe the organization's patch management processes, would be a better fit for the Interview method of assessment, which focuses on gathering information from personnel.
upvoted 2 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...