Exam 712-50 All QuestionsBrowse all questions from this exam
Question 103

Scenario: A Chief Information Security Officer (CISO) recently had a third party conduct an audit of the security program. Internal policies and international standards were used as audit baselines. The audit report was presented to the CISO and a variety of high, medium and low rated gaps were identified. The CISO has validated audit findings, determined if compensating controls exist, and started initial remediation planning.

Which of the following is the MOST logical next step?

    Correct Answer: B

    After validating the audit findings and initiating the remediation planning, the next logical step is to report the audit findings and remediation status to business stakeholders. This ensures that all relevant parties are informed about the current state of the security program, the identified gaps, and the plans to address them. Communicating this information is crucial for gaining their buy-in, securing necessary resources, and ensuring that the remediation efforts align with the organization's strategic objectives.

Discussion
chimaerantOption: B

Nice ChatGPT. The effectiveness of current controls has already taken place. Given answer is correct.

arifbhatkarOption: C

The most logical next step in this scenario would be option C: Validate the effectiveness of current controls. After identifying the gaps in the security program through the audit, it is essential to verify whether the existing controls are effectively addressing the identified risks or if further adjustments are necessary. This validation helps ensure that the controls are providing the intended level of protection and mitigating the identified vulnerabilities. In summary, validating the effectiveness of current controls is the most logical next step as it ensures that the existing controls are providing the intended level of protection. This step provides a solid foundation for creating detailed remediation plans (option A) and reporting to business stakeholders (option B), while reviewing security procedures (option D) comes later in the process.

johndoe69Option: B

Reporting to Business Stakeholders: After validating the audit findings and starting initial remediation planning, it is essential to communicate the results and the status of the remediation efforts to business stakeholders. This ensures that all relevant parties are informed about the security posture, the identified gaps, and the steps being taken to address them. It also helps in gaining their support and approval for any required resources or changes.

moodi5005Option: B

The most logical next step in this scenario would be option B