Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 686 discussion

Actual exam question from Isaca's CISM
Question #: 686
Topic #: 1
[All CISM Questions]

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

  • A. Instruct the vendor to conduct penetration testing.
  • B. Suspend the connection to the application in the firewall.
  • C. Initiate the organization’s incident response process.
  • D. Report the situation to the business owner of the application.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Booict
2 months, 3 weeks ago
Selected Answer: D
D - When a serious vulnerability is identified but no incident has occurred, the best course of action is to report the situation to the business owner of the application (Option D).
upvoted 1 times
...
jcisco123
10 months ago
Selected Answer: C
Although the situation involves a vulnerability detection rather than an active incident, the initiation of the incident response process is still the most prudent course of action. Reporting the situation to the business owner of the application could be a step in the incident response plan.
upvoted 1 times
...
blehbleh
10 months, 2 weeks ago
Selected Answer: D
It is D, not C. No incident has occurred just a vulnerability has been identified. If an incident had occurred then the answer would be C. But seeing as how it was identified the answer is D.
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
Selected Answer: D
Option D is the right answer, this is not an incident but a detection of a vulnerability.
upvoted 1 times
...
Goseu
1 year, 4 months ago
Of course D . There is no incident present to initiate any process . Would you initiate IR every time you found a vulnerability ? I guess not .
upvoted 3 times
...
ddharia94
1 year, 4 months ago
Selected Answer: D
I would go with D. The cloud application used by the org sounds like a third party off the shelf app. You wouldn't initiate your orgs IR process for a third party cloud solution
upvoted 2 times
...
richck102
1 year, 4 months ago
C. Initiate the organization’s incident response process.
upvoted 1 times
...
Jae_kes
1 year, 5 months ago
Selected Answer: C
C. Initiate the organization’s incident response process
upvoted 1 times
chanke
1 year, 5 months ago
Although you are not wrong, remember who is responsible for the applications. There is nothing you can do if the app is not your asset. Confusing but I get where you answer is coming from.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...