exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 438 discussion

Actual exam question from Isaca's CISM
Question #: 438
Topic #: 1
[All CISM Questions]

A critical vulnerability is found on a server hosting multiple applications owned by different business units. One of the business units finds its hosted application will not function with the patch applied and chooses to accept the risk. Which of the following should be the information security manager s NEXT course of action?

  • A. Update the risk register
  • B. Develop a business case for compensating controls
  • C. Update the information security policy
  • D. Consult the incident management process
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 7 months ago
Selected Answer: A
A. Update the risk register The information security manager's next course of action should be to update the risk register. The risk register is a document that is used to identify, assess, and prioritize risks to the organization.
upvoted 10 times
...
[Removed]
Highly Voted 1 year ago
Selected Answer: B
The CISM (Certified Information Security Manager) Review Manual, 27th Edition, supports this viewpoint by stating: "When a risk can't be mitigated directly, such as when a necessary patch can't be applied, compensating controls should be considered. The information security manager is responsible for developing a business case to implement these controls, which can provide an equivalent level of security."
upvoted 9 times
SilverFox
10 months, 1 week ago
Fake answer from fake book
upvoted 4 times
Manix
7 months, 1 week ago
This is from CISA review manual
upvoted 1 times
...
...
...
HN2025
Most Recent 1 month ago
Selected Answer: A
the primary and immediate next action should indeed be to update the risk register (Option A) to document the acceptance of the risk by the business owner. This action ensures transparency and accountability for the decision made. Once the risk has been documented, the next step would be to develop a business case for compensating controls (Option B) to address the potential impact of the vulnerability with alternative measures.
upvoted 2 times
...
Josef4CISM
1 month, 3 weeks ago
Selected Answer: A
The question asks for the NEXT course of action. Since the risk was accepted already, the security manager needs to update the risk register as a NEXT course of action. Again the risk was formerly accepted already. AFTER updating the risk register, the security manager is highly advised to develop a business case for compensating controls.
upvoted 2 times
...
realmjmj
2 months, 2 weeks ago
Selected Answer: B
it's B. when a critical vulnerability is found and may affect other BUs on this shared server, compensating control is most required.
upvoted 2 times
d7a2ba6
2 months, 2 weeks ago
Agree. One BU can not accept the risk for an other. If the risk for the other BU is over the risk apetite of the whole company then what?
upvoted 1 times
...
...
yottabyte
5 months, 1 week ago
Selected Answer: A
Perform A first before doing B.
upvoted 1 times
...
POWNED
8 months ago
Selected Answer: A
A decision has been made, time to update the risk register.
upvoted 2 times
...
Soleandheel
9 months, 1 week ago
A. Update the risk register first before taking any other action. After updating the risk register it will then make sense to proceed on to B. Develop a business case for compensating controls.
upvoted 4 times
...
Agamennore
1 year ago
Selected Answer: B
"When a risk can't be mitigated directly, such as when a necessary patch can't be applied, compensating controls should be considered. The information security manager is responsible for developing a business case to implement these controls, which can provide an equivalent level of security."
upvoted 1 times
...
Hugo1717
1 year ago
Selected Answer: B
B. Develop a business case for compensating controls: This is the correct answer. When a risk is accepted due to operational requirements, the organization needs to identify and implement alternative controls that can mitigate the risk without negatively impacting the business process. Developing a business case that outlines the compensating controls, their effectiveness, and their cost will help make an informed decision.
upvoted 2 times
...
richck102
1 year, 2 months ago
A. Update the risk register
upvoted 1 times
...
wello
1 year, 2 months ago
Selected Answer: B
Since one of the business units has identified that their application will not function with the patch applied and has chosen to accept the risk, the information security manager should work with that business unit to identify and implement compensating controls that mitigate the risk posed by the vulnerability. The purpose of the compensating controls is to provide an alternative means of reducing the risk to an acceptable level while addressing the functional requirements of the business unit's application. Once the compensating controls have been identified and implemented, the information security manager should then update the risk register to reflect the acceptance of the risk and document the compensating controls that have been put in place. This ensures that the risk is appropriately tracked and managed, and the risk register accurately reflects the organization's risk landscape.
upvoted 4 times
...
dark_3k03r
1 year, 4 months ago
Selected Answer: A
The Correct answer is (A) Update the risk register. This is so the decision that has been made by one of the owners can be documented and the rest of the businesses can transparency into what has occurred. From here on out (A) serves as the foundation for the rest of the answers. Rationale: (B) Developing a business case for compensating controls that should be done after the entry has been made in the risk register. Otherwise, the reason for the compensating controls will be lost to history. (C) Update the information security policy is not a scalable solution as policies shouldn't change and if every exception prompts a policy change... then the policy will collapse under its own weight. (D) Consult the incident management process , it's not an incident yet , so it doesn't apply.
upvoted 5 times
...
ccKane
1 year, 6 months ago
Selected Answer: D
The incident management process will help the information security manager determine the appropriate actions to take, including any necessary compensating controls or other measures to mitigate the risk. The risk register should also be updated to reflect the new risk profile resulting from the vulnerability, but this should not be the next course of action since addressing the vulnerability and its potential impact is more important in the short-term. Updating the information security policy may be necessary in the longer-term, but it is not the immediate next step.
upvoted 2 times
CarlLimps
1 year, 5 months ago
Uh no. ccKane, your comments are just wrong. It's A. Update that risk register.
upvoted 2 times
...
...
MyKasala
1 year, 7 months ago
Selected Answer: B
I think B
upvoted 2 times
...
aokisan
1 year, 8 months ago
Selected Answer: A
after choice of accept risk, update register.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago