ISC2 CISSP Practice Question
A security assessment of a critical manufacturing system identified several high-risk vulnerabilities that cannot be patched due to operational constraints. When documenting these findings in the final report, what is the BEST approach to handling these exceptions?
Document the vulnerabilities with compensating controls and a risk acceptance timeframe
Document the vulnerabilities and outline interim measures since they are not fixed currently
Recommend scheduling a system shutdown once patches can be applied
Mark the vulnerabilities as false positives to clear them from the report