ExamGecko
Question list
Search
Search

Question 34 - CISM discussion

Report
Export

Which of the following should be the PRIMARY area of focus when mitigating security risks associated with emerging technologies?

A.
Compatibility with legacy systems
Answers
A.
Compatibility with legacy systems
B.
Application of corporate hardening standards
Answers
B.
Application of corporate hardening standards
C.
Integration with existing access controls
Answers
C.
Integration with existing access controls
D.
Unknown vulnerabilities
Answers
D.
Unknown vulnerabilities
Suggested answer: D

Explanation:

= The primary area of focus when mitigating security risks associated with emerging technologies is unknown vulnerabilities. Emerging technologies are new and complex, and often involve multiple parties, interdependencies, and uncertainties.Therefore, they may have unknown vulnerabilities that could expose the organization to threats that are difficult to predict, detect, or prevent1.Unknown vulnerabilities could also result from the lack of experience, knowledge, or best practices in implementing, operating, or securing emerging technologies2.Unknown vulnerabilities could lead to serious consequences, such as data breaches, system failures, reputational damage, legal liabilities, or regulatory sanctions3. Therefore, it is important to focus on identifying, assessing, and addressing unknown vulnerabilities when mitigating security risks associated with emerging technologies.

The other options are not as important as unknown vulnerabilities, because they are either more predictable, manageable, or specific. Compatibility with legacy systems is a technical issue that could affect the performance, functionality, or reliability of emerging technologies, but it is not a security risk per se.It could be resolved by testing, upgrading, or replacing legacy systems4. Application of corporate hardening standards is a security measure that could reduce the attack surface and improve the resilience of emerging technologies, but it is not a sufficient or comprehensive solution. It could be limited by the availability, applicability, or effectiveness of the standards. Integration with existing access controls is a security requirement that could prevent unauthorized or inappropriate access to emerging technologies, but it is not a guarantee of security.It could be challenged by the complexity, diversity, or dynamism of the access scenarios.Reference=1: Performing Risk Assessments of Emerging Technologies - ISACA2: Assessing the Risk of Emerging Technology - ISACA3: Factors Influencing Public Risk Perception of Emerging Technologies: A ...4: CISM Review Manual 15th Edition, Chapter 3, Section 3.3 : CISM Review Manual 15th Edition, Chapter 3, Section 3.4 : CISM Review Manual 15th Edition, Chapter 3, Section 3.5

asked 01/10/2024
khalid Hassan
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first