Which of the following would present the GREATEST risk to information security?
A.
Virus signature files updates are applied to all servers every day
B.
Security access logs are reviewed within five business days
C.
Critical patches are applied within 24 hours of their release
D.
Security incidents are investigated within five business days
Explanation:
Security incidents are configured to capture system events that are important from the security
perspective; they include incidents also captured in the security access logs and other monitoring
tools. Although, in some instances, they could wait for a few days before they are researched,
from the options given this would have the greatest risk to security. Most often, they should be
analyzed as soon as possible. Virus signatures should be updated as often as they become
available by the vendor, while critical patches should be installed as soon as they are reviewed
and tested, which could occur in 24 hours.