IsacaIsaca
CISM · Question #770
CISM Question #770: Real Exam Question with Answer & Explanation
Sign in or unlock CISM to reveal the answer and full explanation for question #770. The question stem and answer options stay visible for context.
Submitted by the_admin· Apr 18, 2026Information Security Risk Management
Question
A serious vulnerability was detected in a business application that can be exploited by external attackers to compromise the system. What is the information security manager's BEST course of action?
Options
- AImplement temporary remediation.
- BAsk the business application owner to apply the fix immediately.
- CReport the risk to the business application owner.
- DImmediately shut down the application.
Unlock CISM to see the answer
You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Risk communication#Roles and responsibilities#Vulnerability management#Risk ownership