ExamGecko
Question list
Search
Search

Related questions

Question 192 - CISA discussion

Report
Export

Which of the following is MOST important to verify when determining the completeness of the vulnerability scanning process?

A.
The organization's systems inventory is kept up to date.
Answers
A.
The organization's systems inventory is kept up to date.
B.
Vulnerability scanning results are reported to the CISO.
Answers
B.
Vulnerability scanning results are reported to the CISO.
C.
The organization is using a cloud-hosted scanning tool for Identification of vulnerabilities
Answers
C.
The organization is using a cloud-hosted scanning tool for Identification of vulnerabilities
D.
Access to the vulnerability scanning tool is periodically reviewed
Answers
D.
Access to the vulnerability scanning tool is periodically reviewed
Suggested answer: A

Explanation:

The completeness of the vulnerability scanning process depends on the accuracy and currency of the organization's systems inventory, which is a list of all the hardware and software assets that are owned or used by the organization. A complete and up-to-date systems inventory can help ensure that all the systems are identified and scanned for vulnerabilities, and that no system is missed or overlooked. Vulnerability scanning results are reported to the CISO is a good practice for ensuring accountability and visibility of the vulnerability management process, but it is not the most important thing to verify when determining the completeness of the vulnerability scanning process, as reporting does not guarantee that all the systems are scanned. The organization is using a cloud-hosted scanning tool for identification of vulnerabilities is a possible option for conducting vulnerability scanning, but it is not the most important thing to verify when determining the completeness of the vulnerability scanning process, as the type of scanning tool does not affect the scope or coverage of the scanning. Access to the vulnerability scanning tool is periodically reviewed is a critical control for ensuring the security and integrity of the vulnerability scanning tool, but it is not the most important thing to verify when determining the completeness of the vulnerability scanning process, as access review does not ensure that all the systems are scanned.

asked 18/09/2024
Louis Flink
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first