CISA Certified Information Systems Auditor – Question0447

Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?

A.
Patch management
B. Log monitoring
C. Antivirus software
D. Intrusion detection

Correct Answer: A