Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 650 discussion

Actual exam question from Isaca's CISM
Question #: 650
Topic #: 1
[All CISM Questions]

The BEST way to identify the risk associated with a social engineering attack is to:

  • A. monitor the intrusion detection system (IDS).
  • B. review single sign-on (SSO) authentication logs.
  • C. perform a business risk assessment of the email filtering system.
  • D. test user knowledge of information security practices.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
meelaan
Highly Voted 1 year, 7 months ago
Selected Answer: D
Social Engg. attackes are not only through E-mails
upvoted 5 times
...
vickyguna78
Most Recent 3 months, 3 weeks ago
social engineering, does not not necessarily mean phishing
upvoted 1 times
...
REHAMAZZAM
9 months, 2 weeks ago
Selected Answer: C
C. Perform a business risk assessment of the email filtering system. The best way to identify the risk associated with a social engineering attack is to perform a business risk assessment of the email filtering system. Social engineering attacks often target email systems as a means to trick users into disclosing sensitive information or performing actions that compromise security. By assessing the effectiveness of the email filtering system and its ability to detect and prevent social engineering attacks, organizations can identify potential risks and implement appropriate mitigation measures. Options A, B, and D may provide valuable insights into security measures but are not specifically focused on identifying the risk associated with social engineering attacks.
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: D
Conducting regular security awareness training and testing can help organizations gauge their employees' susceptibility to social engineering attacks and provide an opportunity to reinforce best practices and correct any weaknesses in their security posture. Monitoring IDS, reviewing SSO authentication logs, and performing business risk assessments are important components of overall security, but they may not directly assess user susceptibility to social engineering, which is the primary concern in this context.
upvoted 2 times
...
richck102
1 year, 4 months ago
D. test user knowledge of information security practices.
upvoted 1 times
...
bambs
1 year, 9 months ago
Selected Answer: C
C should be the answer
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...