ExamGecko
Question list
Search
Search

Question 360 - CISM discussion

Report
Export

To ensure that a new application complies with information security policy, the BEST approach is to:

A.
review the security of the application before implementation.
Answers
A.
review the security of the application before implementation.
B.
integrate functionality the development stage.
Answers
B.
integrate functionality the development stage.
C.
perform a vulnerability analysis.
Answers
C.
perform a vulnerability analysis.
D.
periodically audit the security of the application.
Answers
D.
periodically audit the security of the application.
Suggested answer: C

Explanation:

Performing a vulnerability analysis is the best option to ensure that a new application complies with information security policy because it helps to identify and evaluate any security flaws or weaknesses in the application that may expose it to potential threats or attacks, and provide recommendations or solutions to mitigate them. Reviewing the security of the application before implementation is not a good option because it may not detect or prevent all security issues that may arise after implementation or deployment. Integrating security functionality at the development stage is not a good option because it may not account for all security requirements or challenges of the application or its environment. Periodically auditing the security of the application is not a good option because it may not address any security issues that may occur between audits or after deployment.

Reference: https://www.isaca.org/resources/isaca-journal/issues/2017/volume-2/secure-software-development-lifecycle https://www.isaca.org/resources/isaca-journal/issues/2016/volume-4/integrating-assurance-functions

asked 01/10/2024
Petros Kapouleas
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first