exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 776 discussion

Actual exam question from Isaca's CISA
Question #: 776
Topic #: 1
[All CISA Questions]

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

  • A. Provide ongoing information security awareness training.
  • B. Establish behavioral analytics monitoring.
  • C. Review perimeter firewall logs.
  • D. Implement data loss prevention (DLP) software
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
maxson69
4 weeks, 1 day ago
Selected Answer: D
DLP software is purpose-built to monitor, detect, and stop sensitive data exfiltration, making it the most effective choice for this scenari
upvoted 1 times
maxson69
4 weeks, 1 day ago
Change my mind here. The answer here should be B because the question asking about "Identifying" here.
upvoted 1 times
...
...
52cb16c
3 months ago
Selected Answer: D
B can't identify the data, it is only detective, not effective solution. DLP can detect the data in real time. D is most effective solution
upvoted 2 times
...
Vima234
10 months, 2 weeks ago
Selected Answer: B
its about identifying
upvoted 1 times
...
PurpleParrot
10 months, 3 weeks ago
Selected Answer: B
the question focuses in identifying the malicious insider..option B seems the right answer as option D is more about prevention of exfiltration
upvoted 2 times
...
KAP2HURUF
12 months ago
Selected Answer: D
DLP software monitors data movement and can identify attempts to transfer sensitive information outside authorized channels. This makes it a more targeted approach for catching malicious insiders. However, a layered security approach is ideal. For comprehensive protection, consider combining DLP with behavioral analytics and ongoing security awareness training.
upvoted 4 times
...
Swallows
1 year, 1 month ago
Selected Answer: B
Behavioral analytics monitoring involves analyzing users' behavior patterns and activities within the organization's systems and networks to detect unusual or suspicious actions that may indicate unauthorized access or data exfiltration. By continuously monitoring user behavior and identifying deviations from normal patterns, organizations can detect potential insider threats and unauthorized data transfers more effectively than relying solely on static rules or signatures. While implementing data loss prevention (DLP) software (option D) is an important measure for preventing and detecting data exfiltration, it primarily focuses on enforcing policies and controls to prevent sensitive data from leaving the organization's network. Behavioral analytics monitoring complements DLP by providing real-time visibility into user activities and behaviors, allowing organizations to proactively identify insider threats, including those that may bypass traditional security measures.
upvoted 1 times
...
saado9
2 years, 2 months ago
B. Establish behavioral analytics monitoring.
upvoted 4 times
007Georgeo
2 years, 2 months ago
but it may not be as specific to identifying exfiltration of sensitive data by a malicious insider, the correct answer is D: It can detect and prevent data exfiltration attempts by malicious insiders, as well as accidental data leaks.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...