Page 1555 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1555

using a baseline. Imaging ensures that systems are deployed with
                    the same, known configuration. Change management processes

                    help prevent outages from unauthorized changes. Vulnerability
                    management processes help to identify vulnerabilities, and patch
                    management processes help to ensure that systems are kept up-to-
                    date.

               17.  A. Change management processes may need to be temporarily
                    bypassed to respond to an emergency, but they should not be

                    bypassed simply because someone thinks it can improve
                    performance. Even when a change is implemented in response to
                    an emergency, it should still be documented and reviewed after the
                    incident. Requesting changes, creating rollback plans, and
                    documenting changes are all valid steps within a change
                    management process.

              18.  D. Change management processes would ensure that changes are

                    evaluated before being implemented to prevent unintended
                    outages or needlessly weakening security. Patch management
                    ensures that systems are up-to-date, vulnerability management
                    checks systems for known vulnerabilities, and configuration
                    management ensures that systems are deployed similarly, but
                    these other processes wouldn’t prevent problems caused by an
                    unauthorized change.


               19.  C. Only required patches should be deployed, so an organization
                    will not deploy all patches. Instead, an organization evaluates the
                    patches to determine which patches are needed, tests them to
                    ensure that they don’t cause unintended problems, deploys the
                    approved and tested patches, and audits systems to ensure that
                    patches have been applied.

              20.  B. Vulnerability scanners are used to check systems for known

                    issues and are part of an overall vulnerability management
                    program. Versioning is used to track software versions and is
                    unrelated to detecting vulnerabilities. Security audits and reviews
                    help ensure that an organization is following its policies but
                    wouldn’t directly check systems for vulnerabilities.
   1550   1551   1552   1553   1554   1555   1556   1557   1558   1559   1560