ExamGecko
Question list
Search
Search

Related questions











Question 622 - CISA discussion

Report
Export

Which of the following is MOST important for an IS auditor to validate when auditing network device management?

A.
Devices cannot be accessed through service accounts.
Answers
A.
Devices cannot be accessed through service accounts.
B.
Backup policies include device configuration files.
Answers
B.
Backup policies include device configuration files.
C.
All devices have current security patches assessed.
Answers
C.
All devices have current security patches assessed.
D.
All devices are located within a protected network segment.
Answers
D.
All devices are located within a protected network segment.
Suggested answer: C

Explanation:

The most important thing for an IS auditor to validate when auditing network device management is that all devices have current security patches assessed. This is because security patches are essential for fixing known vulnerabilities and preventing unauthorized access, data breaches, or denial-of-service attacks on the network devices.If the network devices are not patched regularly, they may expose the network to various cyber threats and compromise the confidentiality, integrity, and availability of the network services and data12.

Devices cannot be accessed through service accounts is not the most important thing to validate because service accounts are typically used for automated tasks or processes that require privileged access to network devices. Service accounts can be secured by using strong passwords, limiting their permissions, and monitoring their activities.However, service accounts alone do not protect the network devices from external or internal attacks that exploit unpatched vulnerabilities3.

Backup policies include device configuration files is not the most important thing to validate because backup policies are mainly used for restoring the network devices in case of failure, disaster, or corruption. Backup policies can help with recovering the network functionality and data, but they do not prevent the network devices from being compromised or attacked in the first place.Backup policies should be complemented by security policies that ensure the network devices are patched and protected4.

All devices are located within a protected network segment is not the most important thing to validate because network segmentation is a technique that divides the network into smaller subnets or zones based on different criteria, such as function, security level, or access control. Network segmentation can help isolate and contain the impact of a potential attack on a network device, but it does not prevent the attack from happening. Network segmentation should be combined with security patching and other security measures to ensure the network devices are secure.

asked 18/09/2024
Kathie Herod
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first