Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 460 discussion

Actual exam question from ISC's CISSP
Question #: 460
Topic #: 1
[All CISSP Questions]

A security consultant has been hired by a company to establish its vulnerability management program. The consultant is now in the deployment phase. Which of the following tasks is part of this process?

  • A. Educate and train key stakeholders.
  • B. Measure effectiveness of the program’s stated goals.
  • C. Determine a budget and cost analysis for the program.
  • D. Select and procure supporting technologies.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
safri
5 months, 2 weeks ago
Selected Answer: D
Agree with D, it's the only one during the development phase
upvoted 1 times
...
GuardianAngel
9 months, 2 weeks ago
Answer: A. Educate and train key stakeholders Educate and train key stakeholders. https://www.cisa.gov/sites/default/files/publications/CRR_Resource_Guide-VM_0.pdf steps in the implementation of the vulnerability management plan: • Provide training. • Conduct vulnerability assessment activities. • Record discovered vulnerabilities. • Categorize and prioritize vulnerabilities. • Manage exposure to discovered vulnerabilities. • Determine effectiveness of vulnerability dispositions. • Analyze root causes Steps in the assessment and improvement of vulnerability management: • Determine the state of the program. • Collect and analyze program information. • Improve the capability.
upvoted 1 times
...
YesPlease
11 months ago
Selected Answer: A
Answer A) Educate and train key stakeholders This seems wrong because you would think all end users would need to get trained and not just key stakeholders....but literally none of the other answers available fall into the deployment stage, except for A. https://www.cisa.gov/sites/default/files/publications/CRR_Resource_Guide-VM_0.pdf
upvoted 3 times
...
Soleandheel
11 months, 1 week ago
D. Select and procure supporting technologies. During the deployment phase, the organization selects and acquires the necessary technologies, tools, and resources that will be used to identify, assess, and remediate vulnerabilities in its IT environment. This includes the acquisition of vulnerability scanning tools, patch management solutions, and other security technologies required for the program.
upvoted 1 times
...
[Removed]
11 months, 2 weeks ago
Selected Answer: D
I think it's option D. I consider the other options as follows: Option C is before the implementation phase. Options A and B are after the implementation phase
upvoted 3 times
...
InclusiveSTEAM
1 year, 1 month ago
D) Selecting and procuring supporting technologies is a task that occurs during the deployment phase of establishing a vulnerability management program. The deployment phase involves getting the necessary tools, technologies and resources in place to operate the vulnerability management program. This includes selecting and procuring solutions like vulnerability scanners, patch management systems, threat intelligence feeds, and any other supporting platforms. The other options relate to different phases: A) Training stakeholders occurs in the planning phase. B) Measuring effectiveness of goals aligns with the maturity phase. C) Budgeting and cost analysis takes place in the concept phase
upvoted 1 times
...
printfmarcelo
1 year, 2 months ago
Selected Answer: B
Conduct vulnerability assessments and penetration tests.   Vulnerability assessments use automated tools to search for known vulnerabilities in systems, applications, and networks. These flaws may include missing patches, misconfigurations, or faulty code that expose the organization to security risks. From: CISSP® Certified Information Systems Security Professional Official Study Guide Ninth Edition
upvoted 1 times
...
Mrtn_Fgra
1 year, 7 months ago
Selected Answer: B
I'd go with B. As per cbk 2015, page 187: The vulnerability management program must then verify that the patch was, in fact, implemented as expected. Although this may seem inherent to the objective, it cannot be assumed. In the case of manual deployment, users and system owners may not respond accordingly or in a timely fashion. Even if timely deployment is executed, the patch may have failed. This is somewhat compensated for in automated deployment; nevertheless, both scenarios require validation of an effective installation.
upvoted 1 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
...
...
Bodatiousbob
1 year, 8 months ago
Selected Answer: D
D is correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...