Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 531 discussion

Actual exam question from Isaca's CISA
Question #: 531
Topic #: 1
[All CISA Questions]

Which of the following should an IS auditor expect to see in a network vulnerability assessment?

  • A. Security design flaws
  • B. Misconfiguration and missing updates
  • C. Zero-day vulnerabilities
  • D. Malicious software and spyware
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
PurpleParrot
3 months, 2 weeks ago
Selected Answer: B
Misconfiguration and missing update
upvoted 1 times
...
3008
1 year, 3 months ago
Selected Answer: B
Misconfiguration and missing updates: This refers to vulnerabilities resulting from improper configuration of the network or software, or failure to apply patches and updates to the network and its components. These vulnerabilities are often easy to exploit and can result in a security breach. An IS auditor should expect to see these types of vulnerabilities during a network vulnerability assessment. Security design flaws: Security design flaws refer to vulnerabilities that exist in the network's design, architecture, or configuration. These types of vulnerabilities can be challenging to identify and remediate, but they can have a significant impact on the network's security. An IS auditor should expect to see security design flaws during a network vulnerability assessment. B > A
upvoted 2 times
...
VictorHsu
1 year, 8 months ago
Selected Answer: A
The answer should be A
upvoted 2 times
Cclantic
1 year, 4 months ago
I think questions may be based on the point of view of vulnerability assessment scanning tool. In a vulnerabilty assessment report,we can see a lot of risk about misconfiguration and missing update.
upvoted 1 times
...
...
Staanlee
1 year, 10 months ago
Can someone explain why A is not the right answer?
upvoted 1 times
PurpleParrot
3 months, 2 weeks ago
While security design flaws can be identified during a comprehensive security review or design assessment, they are typically not the primary focus of a network vulnerability assessment. Vulnerability assessments are more concerned with identifying known issues within the current configuration and software.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...