Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 41 discussion

Actual exam question from Isaca's CISM
Question #: 41
Topic #: 1
[All CISM Questions]

An organization is concerned with the potential for exploitation of vulnerabilities in its server systems. Which of the following is the BEST control to mitigate the associated risk?

  • A. Enforcing standard system configurations based on secure configuration benchmarks
  • B. Implementing network and system-based anomaly monitoring software for server systems
  • C. Enforcing configurations for secure logging and audit trails on server systems
  • D. Implementing host-based intrusion detection systems (IDS) on server systems
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Viperhunter
12 months ago
Selected Answer: A
Enforcing standard system configurations based on secure configuration benchmarks ensures that servers are configured in a secure and consistent manner. This reduces the likelihood of vulnerabilities resulting from misconfigurations that could be exploited by attackers. Secure configuration benchmarks provide guidelines and best practices for configuring systems to minimize security risks. While implementing network and system-based anomaly monitoring software (option B), enforcing configurations for secure logging and audit trails (option C), and implementing host-based intrusion detection systems (IDS) (option D) are valuable security measures, enforcing secure configurations is a foundational control that addresses the root cause of many vulnerabilities.
upvoted 2 times
...
Azurefox79
1 year, 3 months ago
Selected Answer: A
A. Many systems, such as Windows OS, come out of box with many vulnerabilities so a secure benchmark is key. Benchmark may do things like require longer PW, disable unused services and accounts that could be exploited.
upvoted 2 times
...
richck102
1 year, 6 months ago
A. Enforcing standard system configurations based on secure configuration benchmarks
upvoted 1 times
...
Antonivs
1 year, 9 months ago
Selected Answer: A
A because is the most complete
upvoted 2 times
...
Prospect57
1 year, 10 months ago
Selected Answer: A
A is correct. The goal here is to see what can be done to mitigate vulnerabilities that may be in place. The only *proactive* option is A.
upvoted 3 times
...
Broesweelies
1 year, 10 months ago
Selected Answer: A
A. Enforcing standard system configurations based on secure configuration benchmarks is the BEST control to mitigate the associated risk. This is because standardizing configurations can help to ensure that systems are configured securely and consistently, making it harder for attackers to exploit vulnerabilities. Additionally, using secure configuration benchmarks can help to ensure that systems are configured in line with industry best practices.
upvoted 1 times
...
SSP_Secure
1 year, 10 months ago
I think C is the correct Answer. Mitigate is the key word here and through Logging you can actually determine the Mitigation path.
upvoted 1 times
grandMa
1 month ago
Here is asked about Controls. That can protect. Logging only provide detections
upvoted 1 times
...
AlexJacobson
11 months, 3 weeks ago
Logging = monitoring and that is NOT mitigation compared to what is under A.
upvoted 1 times
...
...
CharlesL
1 year, 10 months ago
Selected Answer: A
Keyword: mitigate
upvoted 3 times
...
aokisan
1 year, 10 months ago
Selected Answer: D
IDS will detect the use of vulnerabilities.
upvoted 1 times
CharlesL
1 year, 10 months ago
Yes, you are correct. However, the question is not asking how to detect but mitigating.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...