Following an unsuccessful denial of service (DoS) attack, identified weaknesses should be:
A.
Tracked and reported on until their final resolution
B.
Noted and re-examined later if similar weaknesses are found
C.
Documented in security awareness programs
D.
Quickly resolved and eliminated regardless of cost
The Answer Is:
A
This question includes an explanation.
Explanation:
Any weaknesses identified, even after an unsuccessful attack, should be tracked and reported until they are fully resolved. This ensures accountability, remediation, and prevention of future incidents. Ignoring or delaying action increases exposure to future threats.
“All vulnerabilities must be tracked, assigned for remediation, and closed out following proper documentation and validation.”
ISACA’s guidance in the practice questions clearly recommends formal tracking and resolution of vulnerabilities as the best practice for ongoing security management.
CISM PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 65% Discount on All Products,
Use Coupon: "ac4s65"