An IS auditor has completed the fieldwork phase of a network security review and is preparing the initial draft of the audit report. Which of the following findings should be ranked as the HIGHEST risk?
A.
Network penetration tests are not performed.
B.
The network firewall policy has not been approved by the information security officer.
C.
Network firewall rules have not been documented.
The absence of a properly approved network firewall policy poses a significant risk because it indicates a lack of formal oversight, accountability, and governance. An unapproved policy may result in misconfigurations or improper firewall rules, which can compromise the entire security infrastructure, allowing potential attackers to exploit vulnerabilities and gain unauthorized access.
Answer: C
While the other findings (network penetration tests not performed, firewall policy not approved by the information security officer, incomplete network device inventory) also represent potential risks to network security, the absence of documented firewall rules is particularly concerning due to its direct impact on the configuration and management of network security controls. Therefore, it should be ranked as the highest risk in the audit report.
By not performing penetration tests, the organization is leaving itself blind to potential security weaknesses that could be exploited by malicious actors. This represents a significant risk to the confidentiality, integrity, and availability of sensitive data.
An incomplete inventory hampers visibility and management. It can lead to unpatched devices, unauthorized access, and security blind spots.
Remember that risk assessment considers both likelihood and impact. In this case, the incomplete inventory poses immediate operational and security risks.
D is the accurate answer. Without a complete inventory of the network in an enterprise, you won’t be able to assess the risk. This is the highest risk then the B comes
The perfect answer would have be B(approval by an info sec officer) but looking at the context of the question “fieldwork phase” has been completed, I think D would be a better option
B. The network firewall policy has not been approved by the information security officer.
The fact that the network's firewall policy has not been approved by the information security officer indicates a lack of control and governance over the network's security settings. This can result in greater vulnerability to attacks and a greater likelihood of security breaches. The lack of approval of the firewall policy can indicate that the security rules have not been established properly and the established security standards are not being followed. This represents a significant risk to the integrity and confidentiality of network data.
It is important to note that the risk classification may vary depending on the context and the specific circumstances of the audited organization. Therefore, it is recommended that the IS auditor perform a full evaluation of the findings and consider other relevant factors before finalizing the highest risk classification.
The approval of the network firewall policy by the information security officer is crucial for ensuring that the organization's network security measures align with established standards, guidelines, and best practices. Without the approval of the information security officer, there is a higher risk of inadequate or ineffective firewall configurations, which can leave the network vulnerable to unauthorized access and potential security breaches.
The highest risk among the listed findings is that network penetration tests are not performed. Without these tests, the organization is unable to identify and address potential vulnerabilities and weaknesses in their network, increasing the likelihood of successful attacks or unauthorized access.
B. The network firewall policy has not been approved by the information security officer should be ranked as the HIGHEST risk. This finding indicates a lack of proper oversight and control over the network security, which can lead to potential breaches or unauthorized access to sensitive data. The approval of the information security officer is important for ensuring the effectiveness of the firewall policy and its compliance with security standards. The other findings, although significant, do not pose as high a risk as the absence of an approved firewall policy.
I think that approving the network firewall policy resides with a higher level other than the information security officer, such as the BOD and senior management.
upvoted 3 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
007Georgeo
Highly Voted 1 year, 2 months ago1Naa
Most Recent 3 weeks, 2 days agoa84n
2 months, 2 weeks ago5b56aae
2 months, 2 weeks agoSwallows
3 months agoTef_corp
3 months, 1 week agozzh52est
4 months, 2 weeks agodan08
4 months, 2 weeks agoRachy
6 months, 1 week agonecoll007
1 year agoCISAGuate22
1 year agoTTH1019
1 year, 1 month agochun2k23
1 year, 1 month agoSBD600
1 year, 2 months agoSlurpistist
1 year, 3 months agoPeter_CISA
1 year, 3 months agoMohamedAbdelaal
1 year, 2 months ago