Which item is included as a recovery model related to patch management?

Prepare for the SANS FOR508 Exam. Use flashcards and multiple-choice questions, each with hints and explanations. Maximize your readiness for the test!

Multiple Choice

Which item is included as a recovery model related to patch management?

Explanation:
The key idea here is that a recovery model for patch management is a structured, proactive process that ensures systems can be restored to a secure state after vulnerabilities are found or exploited. Establishing a comprehensive patch management program embodies this by formalizing how patches are identified, tested, deployed, and verified, along with rollback plans and governance. It includes asset inventory, risk-based patch prioritization, testing in a controlled environment, scheduled deployment, change management, and post-deployment verification. This directly supports recovery from incidents by quickly removing known vulnerabilities and ensuring systems stay up-to-date, reducing the window of exposure. While the other options are important for overall security, they don’t focus on the patch lifecycle as a recovery capability. Improving enterprise authentication strengthens access controls; network redesign changes topology and resilience but isn’t about patch recovery; centralized logging aids detection and forensics but doesn’t establish the patching process, testing, deployment, and rollback that a patch management program provides.

The key idea here is that a recovery model for patch management is a structured, proactive process that ensures systems can be restored to a secure state after vulnerabilities are found or exploited. Establishing a comprehensive patch management program embodies this by formalizing how patches are identified, tested, deployed, and verified, along with rollback plans and governance. It includes asset inventory, risk-based patch prioritization, testing in a controlled environment, scheduled deployment, change management, and post-deployment verification. This directly supports recovery from incidents by quickly removing known vulnerabilities and ensuring systems stay up-to-date, reducing the window of exposure.

While the other options are important for overall security, they don’t focus on the patch lifecycle as a recovery capability. Improving enterprise authentication strengthens access controls; network redesign changes topology and resilience but isn’t about patch recovery; centralized logging aids detection and forensics but doesn’t establish the patching process, testing, deployment, and rollback that a patch management program provides.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy