exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 71 discussion

Actual exam question from Isaca's CISM
Question #: 71
Topic #: 1
[All CISM Questions]

When monitoring the security of a web-based application, which of the following is MOST frequently reviewed?

  • A. Audit reports
  • B. Access logs
  • C. Access lists
  • D. Threat metrics
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Endy007
5 months, 1 week ago
Could you kindly clarify from which section of the CISM exam questions are expected? In other words, which question numbers correspond to the current section being addressed? I'm seeking assistance from someone who has taken the exam and can provide guidance on this matter.
upvoted 1 times
usercism007
3 months, 3 weeks ago
This question is from Domain 3 and Domin 4 combined.
upvoted 1 times
...
...
oluchecpoint
7 months, 1 week ago
Selected Answer: B
Access logs are the most frequently reviewed when monitoring the security of a web-based application because they provide valuable real-time information about user activity and potential security threats.
upvoted 1 times
...
Viperhunter
9 months, 4 weeks ago
Selected Answer: B
Access logs provide a detailed record of activities related to user access, including login attempts, resource access, and other relevant events. Monitoring access logs is a common practice in web application security to identify any suspicious or unauthorized activities. It helps in detecting potential security incidents, such as unauthorized access attempts, unusual patterns of behavior, or potential exploitation of vulnerabilities. While audit reports (option A) may provide a broader overview of security-related events, access logs are more specific to user interactions with the web application. Access lists (option C) are typically associated with network security and may not be as directly relevant to web application monitoring. Threat metrics (option D) can be important but may not be as frequently reviewed as access logs for day-to-day monitoring.
upvoted 1 times
...
oluchecpoint
1 year ago
A. Access logs are the most frequently reviewed when monitoring the security of a web-based application because they provide valuable real-time information about user activity and potential security threats.
upvoted 1 times
oluchecpoint
1 year ago
Correction!!! B. Access logs
upvoted 1 times
...
...
richck102
1 year, 3 months ago
B. Access logs
upvoted 2 times
...
STUDYER2
1 year, 7 months ago
what is access list?
upvoted 1 times
...
Antonivs
1 year, 7 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
dark7ness
1 year, 10 months ago
Selected Answer: B
B is correct
upvoted 1 times
...
Cytrail
1 year, 11 months ago
Selected Answer: B
Logs should be reviewed often not reports. Reports are generated as needed, logs are aggregated on the fly.
upvoted 4 times
...
MSKid
1 year, 11 months ago
Selected Answer: A
Access Logs are viewed more than the offered answers. Some support from CISM AIO 2nd under Logging
upvoted 1 times
CharlesL
1 year, 8 months ago
???? But you chose A
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago