ExamGecko
Question list
Search
Search

Question 96 - CISM discussion

Report
Export

Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?

A.
Intrusion detection
Answers
A.
Intrusion detection
B.
Log monitoring
Answers
B.
Log monitoring
C.
Patch management
Answers
C.
Patch management
D.
Antivirus software
Answers
D.
Antivirus software
Suggested answer: C

Explanation:

= Patch management is the process of applying updates to software and hardware systems to fix security vulnerabilities and improve functionality. Patch management is one of the best ways to prevent the exploitation of system vulnerabilities, as it reduces the attack surface and closes the gaps that attackers can exploit. Patch management also helps to ensure compliance with security standards and regulations, and maintain the performance and availability of systems.

Intrusion detection is the process of monitoring network or system activities for signs of malicious or unauthorized behavior. Intrusion detection can help to detect and respond to attacks, but it does not prevent them from happening in the first place. Log monitoring is the process of collecting, analyzing and reviewing log files generated by various systems and applications. Log monitoring can help to identify anomalies, errors and security incidents, but it does not prevent them from occurring. Antivirus software is the program that scans files and systems for viruses, malware and other malicious code. Antivirus software can help to protect systems from infection, but it does not prevent the exploitation of system vulnerabilities that are not related to malware.

Therefore, patch management is the best security process to prevent the exploitation of system vulnerabilities, as it addresses the root cause of the problem and reduces the risk of compromise.Reference= CISM Review Manual, 16th Edition eBook | Digital | English1, Chapter 4: Information Security Program Development and Management, Section 4.3: Information Security Program Resources, Subsection 4.3.1: Information Security Infrastructure and Architecture, Page 204.

asked 01/10/2024
Mirza Daniyal Baig
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first