Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISA All Questions

View all questions & answers for the CISA exam

Exam CISA topic 1 question 776 discussion

Actual exam question from Isaca's CISA
Question #: 776
Topic #: 1
[All CISA Questions]

Which of the following is the MOST effective way to identify exfiltration of sensitive data by a malicious insider?

  • A. Provide ongoing information security awareness training.
  • B. Establish behavioral analytics monitoring.
  • C. Review perimeter firewall logs.
  • D. Implement data loss prevention (DLP) software
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Vima234
2 months, 2 weeks ago
Selected Answer: B
its about identifying
upvoted 1 times
...
PurpleParrot
2 months, 3 weeks ago
Selected Answer: B
the question focuses in identifying the malicious insider..option B seems the right answer as option D is more about prevention of exfiltration
upvoted 2 times
...
KAP2HURUF
4 months ago
Selected Answer: D
DLP software monitors data movement and can identify attempts to transfer sensitive information outside authorized channels. This makes it a more targeted approach for catching malicious insiders. However, a layered security approach is ideal. For comprehensive protection, consider combining DLP with behavioral analytics and ongoing security awareness training.
upvoted 3 times
...
Swallows
5 months, 3 weeks ago
Selected Answer: B
Behavioral analytics monitoring involves analyzing users' behavior patterns and activities within the organization's systems and networks to detect unusual or suspicious actions that may indicate unauthorized access or data exfiltration. By continuously monitoring user behavior and identifying deviations from normal patterns, organizations can detect potential insider threats and unauthorized data transfers more effectively than relying solely on static rules or signatures. While implementing data loss prevention (DLP) software (option D) is an important measure for preventing and detecting data exfiltration, it primarily focuses on enforcing policies and controls to prevent sensitive data from leaving the organization's network. Behavioral analytics monitoring complements DLP by providing real-time visibility into user activities and behaviors, allowing organizations to proactively identify insider threats, including those that may bypass traditional security measures.
upvoted 1 times
...
saado9
1 year, 6 months ago
B. Establish behavioral analytics monitoring.
upvoted 4 times
007Georgeo
1 year, 6 months ago
but it may not be as specific to identifying exfiltration of sensitive data by a malicious insider, the correct answer is D: It can detect and prevent data exfiltration attempts by malicious insiders, as well as accidental data leaks.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...