Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 1220 discussion

Actual exam question from Isaca's CISM
Question #: 1220
Topic #: 1
[All CISM Questions]

During incident recovery, which of the following is the BEST approach to ensure the eradication of traces hidden by an attacker?

  • A. Reinstall the system from the original source.
  • B. Perform continuous monitoring until validation is achieved.
  • C. Prohibit use of the account suspected to be compromised.
  • D. Conduct a forensic investigation to acquire evidence.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ServerBrain
3 weeks, 4 days ago
Selected Answer: A
A. Reinstall the system from the original source.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...