Isaca Certified Information Systems Auditor CISA Question # 379 Topic 38 Discussion

Isaca Certified Information Systems Auditor CISA Question # 379 Topic 38 Discussion

CISA Exam Topic 38 Question 379 Discussion:
Question #: 379
Topic #: 38

An IS auditor finds ad hoc vulnerability scanning is in place with no clear alignment to the organization's wider security threat and vulnerability management program.

Which of the following would BEST enable the organization to work toward improvement in this area?


A.

Implementing security logging to enhance threat and vulnerability management


B.

Maintaining a catalog of vulnerabilities that may impact mission-critical systems


C.

Using a capability maturity model to identify a path to an optimized program


D.

Outsourcing the threat and vulnerability management function to a third party


Get Premium CISA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.