exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 523 discussion

Actual exam question from Isaca's CISM
Question #: 523
Topic #: 1
[All CISM Questions]

An organization's intrusion prevention system (IPS) detected and blocked an unusually large number of external intrusion attempts within a 24-hour period. Which of the following should be the information security manager's FIRST course of action?

  • A. Perform security assessments on Internet-facing systems.
  • B. Identify the source and nature of the attempts.
  • C. Review the server and firewall audit logs.
  • D. Report the issue to senior management.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Broesweelies
Highly Voted 1 year, 5 months ago
Selected Answer: B
B. Identify the source and nature of the attempts should be the information security manager's first course of action after an organization's intrusion prevention system (IPS) detected and blocked an unusually large number of external intrusion attempts within a 24-hour period. Identifying the source of the intrusion attempts, such as the IP addresses or domains involved, and the nature of the attempts, such as the types of attack vectors used, can help to determine the level of threat and the potential impact on the organization. This information can then be used to take appropriate defensive measures, such as blocking the IP addresses or domains involved, and hardening systems against the attack vectors used. The other options such as performing security assessments on Internet-facing systems, reviewing the server and firewall audit logs and reporting the issue to senior management are also important, but identifying the source and nature of the attempts should be the first step to take.
upvoted 5 times
...
Josef4CISM
Most Recent 3 days ago
Selected Answer: B
You do B by doing C (and vice versa). However, I think the question here is more about the purpose of the next steps, which is indeed identifying the source and nature of the events. It's an unfair question though, given the ambiguous answer options.
upvoted 1 times
...
shervin2s
3 months, 3 weeks ago
Selected Answer: C
How do you identify the source without analysing the logs?
upvoted 2 times
...
Bisibaby
5 months ago
Selected Answer: C
The question is what do you check to identify the source of attempts. Your first step is to review logs, then analyze and determine the nature.Reviewing server and firewall logs would precede any further analysis
upvoted 3 times
...
CISSPST
9 months, 2 weeks ago
Selected Answer: B
Root cause analysis, i.e., identifying and analyzing the source will be the first recourse. Security assessments of internet-facing systems and reviewing server and firewall logs can support analysis of the depth and nature of problem, but only after identifying the source.
upvoted 1 times
...
AaronS1990
10 months, 2 weeks ago
Selected Answer: B
You are more than likely going to need to do C in order to achieve B so it seems a bit backwards HOWEVER... B could potentially be achieved WITHOUT digging through firewall logs. So if we are being specific about it (which for once ISACA actually is) identifying the source and nature is top priority.
upvoted 2 times
...
Goseu
12 months ago
Selected Answer: B
B sounds good ,think like a manager.
upvoted 1 times
...
richck102
1 year ago
B. Identify the source and nature of the attempts.
upvoted 1 times
...
karanvp
1 year ago
Selected Answer: C
Answer is C, because even to do the action in option B, we need logs.
upvoted 1 times
...
Dravidian
1 year, 2 months ago
Selected Answer: B
Trying to identify the nature of the attack does make more sense to me. The attack has been prevented so don't see the point in reviewing audit logs. Also, as a part of identifying the issue, one would check all types of logs.
upvoted 1 times
...
it_expert_cism
1 year, 4 months ago
B should be correct in my point of view as per question
upvoted 2 times
...
aokisan
1 year, 6 months ago
Selected Answer: A
evaluate the security of system facing threat.
upvoted 2 times
...
D2D2
1 year, 7 months ago
Selected Answer: C
I agree with EZPASS, you need to review the logs in order to gain an understanding of the source of the attack.
upvoted 2 times
...
g4g
1 year, 7 months ago
I think B is correct. You already have detected, next course of action should be investigate
upvoted 2 times
...
EZPASS
1 year, 8 months ago
Selected Answer: C
I think the correct answer is C. The "first" action is to review and investigate the alerts/logs to understand the behavior of the intrusions. You identify by reviewing the logs to extract as much information as possible.
upvoted 3 times
AlexJacobson
5 months, 2 weeks ago
Would you, as an infosec manager, go and dig through FW logs or would you tell security team to do that, so you can get the bigger picture in the end? Think like a manager!
upvoted 1 times
...
...
Ziggybooboo
1 year, 8 months ago
Agreed
upvoted 1 times
...
k4d4v4r
1 year, 9 months ago
Selected Answer: B
Why review the logs when you already know what happened? Why not investigate? I'd go with B
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago