Valid CISM Dumps shared by ExamDiscuss.com for Helping Passing CISM Exam! ExamDiscuss.com now offer the newest CISM exam dumps, the ExamDiscuss.com CISM exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com CISM dumps with Test Engine here:
What mechanisms are used to identify deficiencies that would provide attackers with an opportunity to compromise a computer system?
Correct Answer: B
Explanation/Reference: Explanation: A security gap analysis is a process which measures all security controls in place against typically good business practice, and identifies related weaknesses. A business impact analysis is less suited to identify security deficiencies. System performance metrics may indicate security weaknesses, but that is not their primary purpose. Incident response processes exist for cases where security weaknesses are exploited.