C: C. Search for anomalies in the environment is generally the better approach.
Here’s why:
Anomaly Detection: APTs are designed to evade traditional security measures and blend in with regular network activity. By searching for anomalies—unusual patterns or behaviors in network traffic, system usage, or data access—you can identify potential signs of an APT that might not fit established patterns of normal activity. This proactive monitoring helps in detecting sophisticated threats that are specifically crafted to evade standard detection methods.
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Pichon
3Â months, 4Â weeks agoafoo1314
10Â months, 3Â weeks agoInfosecnerd
10Â months, 3Â weeks ago3czz
1Â year, 4Â months agorichck102
1Â year, 9Â months ago