ExamGecko
Question list
Search
Search

Related questions

Question 1093 - CISA discussion

Report
Export

Which of the following is MOST important for the successful establishment of a security vulnerability management program?

A.
A robust tabletop exercise plan
Answers
A.
A robust tabletop exercise plan
B.
A comprehensive asset inventory
Answers
B.
A comprehensive asset inventory
C.
A tested incident response plan
Answers
C.
A tested incident response plan
D.
An approved patching policy
Answers
D.
An approved patching policy
Suggested answer: B

Explanation:

A comprehensive asset inventory is the most important factor for the successful establishment of a security vulnerability management program.A security vulnerability management program is a systematic process of identifying, assessing, prioritizing, and remediating vulnerabilities in the organization's IT environment1.A comprehensive asset inventory is a complete and accurate record of all the hardware, software, and network components that the organization owns or uses2. A comprehensive asset inventory helps the organization to:

Know what assets are in scope for vulnerability scanning and assessment3.

Identify the vulnerabilities that affect each asset and their severity level4.

Prioritize the remediation of vulnerabilities based on the criticality and value of each asset.

Track the status and progress of vulnerability remediation for each asset.

Measure the effectiveness and maturity of the vulnerability management program.

A robust tabletop exercise plan is a simulated scenario that tests the organization's preparedness and response capabilities for a potential cyberattack or incident. A tabletop exercise plan is useful for validating and improving the organization's incident response plan, but it is not essential for establishing a security vulnerability management program.

A tested incident response plan is a documented process that defines the roles, responsibilities, and actions of the organization's personnel in the event of a cyberattack or incident. A tested incident response plan is important for minimizing the impact and restoring normal operations after a security breach, but it is not critical for establishing a security vulnerability management program.

An approved patching policy is a set of rules and guidelines that governs how the organization applies patches and updates to its IT systems and applications. An approved patching policy is a key component of the remediation phase of the vulnerability management program, but it is not sufficient for establishing a security vulnerability management program.

asked 18/09/2024
rene laas
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first