Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 199 discussion

Actual exam question from Isaca's CISM
Question #: 199
Topic #: 1
[All CISM Questions]

After a server has been attacked, which of the following is the BEST course of action?

  • A. Isolate the system.
  • B. Initiate incident response.
  • C. Conduct a security audit.
  • D. Review vulnerability assessment.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
e891cd1
7 months, 3 weeks ago
A. initiate the incident response plan
upvoted 1 times
...
shervin2s
8 months ago
Selected Answer: B
Isolation is part of IR.
upvoted 1 times
...
xcjxcj
8 months, 2 weeks ago
Selected Answer: B
If it is DDOS attack, isolate system is helping attckers.
upvoted 4 times
03allen
6 months, 3 weeks ago
Good example!
upvoted 1 times
...
...
oluchecpoint
9 months, 3 weeks ago
Selected Answer: B
B. Initiate incident response. Incident response involves a structured approach to addressing and managing a security incident. Answer A is included is B
upvoted 3 times
...
AlexJacobson
9 months, 4 weeks ago
Selected Answer: B
This question is actually pretty easy once you read it right. :) It asks for the "BEST course of action". Isolating the system isn't the solution, it's just one step towards the solution. Initiating incident response is the solution, and part of IR is containment (isolation of the affected system), but the thing is IR then goes further until the issue has been resolved.
upvoted 1 times
...
jcisco123
10 months, 4 weeks ago
A is a part of the B. Isolating the server should be done as part of the incident response.
upvoted 2 times
...
learntstuff
11 months, 1 week ago
Selected Answer: A
It asks for the BEST solution not the FIRST step. Best solution is to isolate. A
upvoted 1 times
Raven89
3 weeks ago
if it is a production server and it is a dos attack.... isolating the server will result in a successful attack ! Always start the incident response, so B
upvoted 1 times
...
...
Learner76
11 months, 3 weeks ago
Selected Answer: B
Answer B - A is part of B
upvoted 1 times
...
Cyberbug2021
12 months ago
Selected Answer: A
you have to isolate the system before you respond to the incident. The answer is A. Isolate the system. After a server has been attacked, the most important step is to isolate the system to prevent further damage and the spread of malware or other threats. This involves disconnecting the server from the network and taking it offline. Once the system is isolated, a thorough investigation can be conducted to determine the extent of the attack and implement appropriate remediation measures. The other options are not as effective: B. Initiate incident response: While initiating incident response is an important step, it should not be done before isolating the system. If the system remains connected to the network, the incident response team may inadvertently spread the attack or compromise other systems.
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
B. Initiate incident response. Incident response involves a structured approach to addressing and managing a security incident.
upvoted 1 times
...
Agamennore
1 year, 2 months ago
Selected Answer: B
You need to start the incident response and WITHIN the containment phase you will isolate the system
upvoted 2 times
...
rickcoyw
1 year, 3 months ago
Selected Answer: B
The best course of action after a server has been attacked is to isolate the system. Isolating the impacted server quarantines the attack and prevents further compromise or spread. This rapid containment is essential to limit damage and any ongoing threats. Initiating full incident response, conducting audits, and reviewing assessments are all important follow-up actions, but require more time. The priority is to immediately isolate the attacked system to halt the attack and protect the environment. Quickly taking the impacted server offline or blocking its network access enables analysis of the attack to safely occur, stopping ongoing malicious activity. Rapid isolation is key before any other incident response steps commence.
upvoted 1 times
...
chanke
1 year, 5 months ago
Selected Answer: B
From my understanding, the incident response team or process would help isolate the threat. you guys aren't wrong with choosing A but A seems to be a sub-component of incident response.
upvoted 2 times
...
richck102
1 year, 5 months ago
A. Isolate the system.
upvoted 1 times
richck102
1 year, 5 months ago
B. Initiate incident response.
upvoted 2 times
...
...
Abhey
1 year, 6 months ago
Selected Answer: A
The first step to take after a server has been attacked is to isolate the system from the rest of the network. This will help prevent the attacker from continuing to access the system and spreading the attack to other systems on the network. Once the system is isolated, an incident response plan should be initiated to determine the extent of the damage and take appropriate action to restore the system and prevent future attacks.
upvoted 2 times
[Removed]
1 year, 4 months ago
you gotta start incident response to isolate the system. you're not gonna isolate it yourself, you're not the admin of the server
upvoted 1 times
...
...
dark_3k03r
1 year, 7 months ago
Selected Answer: B
The best response is (B) Initiate the incident response process. Rationale: A. Isolate the system is part of the incident response process. In addition to isolate it also has detect and analyze. It has apparently been detected, but has the attack been analyzed for lateral movement? Has its full scope been understood? Without this isolation is premature. and as mentioned is a later phase of incident response. C. Conduct a security audit - A little late for this no? It also doesn't do anything to address the situation. D. Review vulnerability assessment. - A little late for this no? It also doesn't do anything to address the situation.
upvoted 3 times
...
Aamir1989
1 year, 7 months ago
The incident response plan will have the the details on best course of action
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...