ExamGecko
Question list
Search
Search

Question 23 - CISM discussion

Report
Export

Which of the following should an information security manager do FIRST upon learning that some security hardening settings may negatively impact future business activity?

A.
Perform a risk assessment.
Answers
A.
Perform a risk assessment.
B.
Reduce security hardening settings.
Answers
B.
Reduce security hardening settings.
C.
Inform business management of the risk.
Answers
C.
Inform business management of the risk.
D.
Document a security exception.
Answers
D.
Document a security exception.
Suggested answer: A

Explanation:

Security hardening is the process of applying security configuration settings to systems and software to reduce their attack surface and improve their resistance to threats1.Security hardening settings are based on industry standards and best practices, such as the CIS Benchmarks2, which provide recommended security configurations for various software applications, operating systems, and network devices.However, security hardening settings may not always be compatible with the business requirements and objectives of an organization, and may negatively impact the functionality, performance, or usability of the systems and software3. Therefore, before applying any security hardening settings, an information security manager should perform a risk assessment to evaluate the potential benefits and drawbacks of the settings, and to identify and prioritize the risks associated with them. A risk assessment is a systematic process of identifying, analyzing, and evaluating the risks that an organization faces, and determining the appropriate risk responses. A risk assessment helps the information security manager to balance the security and business needs of the organization, and to communicate the risk level and impact to the relevant stakeholders.A risk assessment should be performed first, before taking any other actions, such as reducing security hardening settings, informing business management of the risk, or documenting a security exception, because it provides the necessary information and justification for making informed and rational decisions.References=1: Basics of the CIS Hardening Guidelines | RSI Security2: CIS Baseline Hardening and Security Configuration Guide | CalCom3: CISM Review Manual 15th Edition, page 121 : CISM Review Manual 15th Edition, page 122 : CISM Review Manual 15th Edition, page 145 : CISM Review Manual 15th Edition, page 146 : CISM Review Manual 15th Edition, page 147

asked 01/10/2024
Yun-Ting Lo
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first