exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 263 discussion

Actual exam question from Isaca's CISM
Question #: 263
Topic #: 1
[All CISM Questions]

Who should an information security manager contact FIRST upon discovering that a cloud-based payment system used by the organization may be infected with malware?

  • A. Senior management
  • B. Affected customers
  • C. Cloud service provider
  • D. The incident response team
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
todush
Highly Voted 11 months, 1 week ago
"may be infected" is not the same as "has been infected". "may be infected" requires first a confirmation of the cloud-based system provider that the probability of an infection is sufficient to trigger a security incident and that it is not just a rumor. So the only good response is C.
upvoted 8 times
realmjmj
3 weeks, 3 days ago
The incident response team should be informed in any way first.
upvoted 1 times
...
...
Vishalgupta26
Most Recent 3 weeks, 4 days ago
Selected Answer: D
Upon discovering a potential malware infection, the incident response team (IRT) should be contacted first. This team is responsible for evaluating, containing, and mitigating security incidents, as well as coordinating the appropriate response actions. Engaging the incident response team ensures the issue is addressed systematically, minimizing impact and avoiding premature communication that may not yet be warranted.
upvoted 1 times
...
helg420
1 month, 3 weeks ago
Selected Answer: D
Tricky qn. as I feel it depends on the culture and expectations of the business you're involved in. In the absence of this info, I'm leaning towards D. Why? Being proactive is part of a broader incident response strategy meaning potential security incidents are managed i.e. contained quickly, effectively, minimizing damage and recovery time. Thinking through IR scenarios ive been in, early assessments, preparation, readiness and good learnings for the IRT were all benefits of situations (confirmed or unconfirmed such as force-majeure).
upvoted 2 times
...
e891cd1
3 months ago
I would say it would go like this D,A,C who calls B
upvoted 1 times
...
CCIEBYDEC
4 months, 2 weeks ago
Selected Answer: C
ISM is the owner of all outsourced , CISM RM 16th Edition
upvoted 1 times
...
oluchecpoint
5 months, 1 week ago
Selected Answer: D
Option D
upvoted 1 times
...
jcisco123
6 months, 2 weeks ago
Selected Answer: D
It will be a job of an incident response team to further check with Cloud provider regarding the potential issue hence option D. The information security manager is not going contact the CSP directly. You may have multiple cloud providers, it's not information security manager's job to contact them individually every time there is a potential problem.
upvoted 3 times
...
Uncle_Lucifer
7 months ago
Selected Answer: C
You need to contact CSP to verify if there is am actual incidence first before escalating to incidence response. --> C
upvoted 1 times
...
Uncle_Lucifer
7 months ago
May is not establishment of an incident. It needs to be confirmed before initiating incidence response. Not D. --> definitely C
upvoted 1 times
...
[Removed]
8 months, 1 week ago
Selected Answer: C
I guess since the issue is not on our side its on CSP's side then we should contact them to confirm the issue, real question who should contact them? The SM or the IR, but i guess since he discovered the issue to cut the time he should do it.
upvoted 2 times
...
richck102
1 year, 1 month ago
D. The incident response team
upvoted 2 times
...
mad68
1 year, 1 month ago
Selected Answer: D
When an information security manager discovers that a cloud-based payment system used by the organization may be infected with malware, the FIRST contact should typically be the organization's incident response team. The incident response team is responsible for handling and coordinating the response to security incidents. The incident response team will assess the situation, gather relevant information, and take appropriate actions to contain and mitigate the impact of the malware infection. They will work towards identifying the root cause, implementing necessary remediation measures, and restoring the system's security.
upvoted 4 times
...
dedfef
1 year, 3 months ago
Selected Answer: C
the correct answer is c
upvoted 3 times
DERCHEF2009
1 year, 3 months ago
And why? Makes no Sense
upvoted 1 times
Uncle_Lucifer
7 months ago
It makes sense. "May be affected" means not verified issue or an incident. You need to verify from CSP first before taking any action. --> C
upvoted 2 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago