exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 173 discussion

Actual exam question from Isaca's CISM
Question #: 173
Topic #: 1
[All CISM Questions]

Which of the following provides the MOST useful information for identifying security control gaps on an application server?

  • A. Risk assessments
  • B. Penetration testing
  • C. Threat models
  • D. Internal audit reports
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
helg420
5 months, 1 week ago
Selected Answer: B
B. Penetration testing Among the options provided, penetration testing is the most practical and direct method for identifying security control gaps on an application server. Penetration testing involves simulating cyber attacks against your computer system to check for exploitable vulnerabilities. This type of testing is designed to discover weaknesses in security controls that an attacker could exploit.
upvoted 3 times
...
03allen
5 months, 3 weeks ago
Selected Answer: A
why not conduct a risk assessment on the server and identify the control gaps?
upvoted 1 times
...
ImTired
1 year ago
Selected Answer: C
According to ISACA (Information Systems Audit and Control Association), threat models (option C) provide the MOST useful information for identifying security control gaps on an application server. Here's why: Proactive Approach: Threat modeling is a proactive approach to identifying and mitigating security risks. It involves systematically analyzing an application's design and architecture to identify potential threats and vulnerabilities. Early Detection: Threat models can uncover security control gaps early in the development or deployment process, allowing organizations to address issues before they become vulnerabilities. Comprehensive Understanding: Threat models provide a comprehensive understanding of potential threats and vulnerabilities specific to the application server, helping organizations tailor their security controls to address these risks effectively.
upvoted 1 times
...
oluchecpoint
1 year ago
Selected Answer: B
PT involves simulating real-world attacks on an application server to identify vulnerabilities and security weaknesses. This provides the most useful information for identifying security control gaps because it actively tests the system's defenses and highlights potential vulnerabilities that attackers could exploit.
upvoted 1 times
...
jjj378
1 year, 4 months ago
Selected Answer: B
B. Penetration testing
upvoted 2 times
...
richck102
1 year, 4 months ago
B. Penetration testing
upvoted 1 times
...
Abhey
1 year, 5 months ago
Selected Answer: B
B. Penetration testing is the most useful information for identifying security control gaps on an application server. Penetration testing is a proactive approach to identifying vulnerabilities in an application or system by simulating a real-world attack. It can identify security control gaps, configuration issues, and potential exploits that could be leveraged by attackers. Penetration testing can also help validate the effectiveness of security controls and identify areas for improvement.
upvoted 2 times
...
bambs
1 year, 6 months ago
Out of the given options, the MOST useful information for identifying security control gaps on an application server would be Penetration testing. Penetration testing involves actively testing a system or application to identify vulnerabilities that an attacker could exploit. It provides a real-world assessment of the security posture of an application server and can help identify security control gaps that may not have been identified through other means. Risk assessments, threat models, and internal audit reports can also be useful in identifying security control gaps, but they tend to be more focused on identifying risks and compliance issues rather than actively testing the system to find vulnerabilities. Therefore, while they can be valuable tools in a comprehensive security assessment, they may not provide the same level of insight into security control gaps as penetration testing. B is the answer
upvoted 2 times
...
dark_3k03r
1 year, 6 months ago
Selected Answer: D
The Correct answer is D cause it is the only one that shows what controls may be missing. A. Risk assessment highlight what threats are likely and the impact that they may have. They say nothing about the actual controls in place. B. Penetration testing can only tell you about the vulnerabilities that can be exploited, but can't tell you anything about the configuration of the controls. (i.e. the settings currently in place) C. Threat models - This shows all the possible threats that may exist, but nothing about the control currently in place. D. Internal audit reports
upvoted 3 times
...
dedfef
1 year, 7 months ago
the asnwer is d
upvoted 1 times
DERCHEF2009
1 year, 6 months ago
and WhatsApp?
upvoted 1 times
DERCHEF2009
1 year, 6 months ago
and why?
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago