ExamGecko
Question list
Search
Search

Question 25 - IT Risk Fundamentals discussion

Report
Export

Which of the following is MOST likely to expose an organization to adverse threats?

A.

Complex enterprise architecture

Answers
A.

Complex enterprise architecture

B.

Improperly configured network devices

Answers
B.

Improperly configured network devices

C.

Incomplete cybersecurity training records

Answers
C.

Incomplete cybersecurity training records

Suggested answer: B

Explanation:

The MOST likely factor to expose an organization to adverse threats is improperly configured network devices. Here's why:

Complex Enterprise Architecture: While complexity can introduce vulnerabilities and increase the difficulty of managing security, it is not inherently the most likely factor to cause exposure. Properly managed complex architectures can still be secure.

Improperly Configured Network Devices: This is the most likely cause of exposure to threats. Network devices such as routers, firewalls, and switches are critical for maintaining security boundaries and controlling access. If these devices are not configured correctly, they can create significant vulnerabilities. For example, default configurations or weak passwords can be easily exploited by attackers to gain unauthorized access, leading to data breaches or network disruptions.

Incomplete Cybersecurity Training Records: While important, incomplete training records alone do not directly expose the organization to threats. It indicates a potential gap in awareness and preparedness but does not directly result in vulnerabilities that can be exploited.

Given the critical role network devices play in an organization's security infrastructure, improper configuration of these devices poses the greatest risk of exposure to adverse threats.

ISA 315 Anlage 5 and 6: Understanding IT risks and controls in an organization's environment, particularly the configuration and management of IT infrastructure.

SAP Reports: Example configurations and the impact of network device misconfigurations on security.

asked 18/11/2024
Marcin Cieślak
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first