ExamGecko
Question list
Search
Search

Question 188 - CISM discussion

Report
Export

Which of the following presents the GREATEST challenge to a security operations center's wna GY of potential security breaches?

A.
IT system clocks are not synchronized with the centralized logging server.
Answers
A.
IT system clocks are not synchronized with the centralized logging server.
B.
Operating systems are no longer supported by the vendor.
Answers
B.
Operating systems are no longer supported by the vendor.
C.
The patch management system does not deploy patches in a timely manner.
Answers
C.
The patch management system does not deploy patches in a timely manner.
D.
An organization has a decentralized data center that uses cloud services.
Answers
D.
An organization has a decentralized data center that uses cloud services.
Suggested answer: A

Explanation:

A security operations center (SOC) relies on the centralized logging server to collect, store, analyze and correlate security events from various sources such as firewalls, intrusion detection systems, antivirus software, etc. The centralized logging server uses the timestamps of the events to perform the analysis and correlation. If the IT system clocks are not synchronized with the centralized logging server, the SOC will face difficulties in identifying the sequence and causality of the events, which will affect its ability to detect and respond to potential security breaches. Therefore, this presents the greatest challenge to the SOC's awareness of potential security breaches.

Operating systems that are no longer supported by the vendor may pose a security risk, but they can be mitigated by applying compensating controls such as isolation, segmentation, monitoring, etc. The patch management system that does not deploy patches in a timely manner may also increase the vulnerability exposure, but it can be remediated by prioritizing and applying the critical patches as soon as possible. An organization that has a decentralized data center that uses cloud services may face some challenges in ensuring the security and compliance of the cloud environment, but it can leverage the cloud service provider's security capabilities and tools to enhance the SOC's visibility and control.Therefore, these options are not the greatest challenges to the SOC's awareness of potential security breaches.Reference= CISM Certified Information Security Manager Study Guide, Chapter 8: Security Operations and Incident Management, page 2691; CISM Foundations: Module 4 Course, Part One: Security Operations and Incident Management2; RSI Security, Common Challenges of SOC Teams3; Infosec Matter, Security Operations Center: Challenges of SOC Teams4

asked 01/10/2024
saiming wong
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first