Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 131 discussion

Actual exam question from Isaca's CISM
Question #: 131
Topic #: 1
[All CISM Questions]

Which of the following is MOST important to do after a security incident has been verified?

  • A. Notify the appropriate law enforcement authorities of the incident.
  • B. Follow the escalation process to inform key stakeholders.
  • C. Prevent the incident from creating further damage to the organization.
  • D. Contact forensic investigators to determine the root cause.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
trev0r
Highly Voted 2 years, 1 month ago
Selected Answer: C
Stop the attack from spreading -> C
upvoted 13 times
[Removed]
1 year, 4 months ago
it doesnt say attack. it says incident. what if is just a policy non compliance? Correct answer is B
upvoted 5 times
Ban12345
9 months, 4 weeks ago
What if the incident is attack ? Correct answer is C
upvoted 1 times
...
...
Ziggybooboo
2 years ago
Agreed
upvoted 2 times
...
...
Agamennore
Highly Voted 1 year, 2 months ago
Selected Answer: B
My first answer was C but… from CISM Review Manual 16th Edition: Containment—After an incident has been identified and confirmed, the IMT is activated and information from the incident handler is shared. The team will conduct a detailed assessment and contact the system owner or business manager of the affected information systems/assets to coordinate further action. The action taken in this phase is to limit the exposure. Activities in this phase include:  Activating the IMT/IRT to contain the incident  Notifying appropriate stakeholders affected by the incident  Obtaining agreement on actions taken that may affect availability of a service or risk of the containment process
upvoted 5 times
...
5fd6335
Most Recent 2 weeks, 5 days ago
The Best answer remaining is C: because . notifying the relevant senior management personnel according to the organization's pre-defined escalation policy, providing details about the incident's nature, impact, and current response actions being taken. After the incident that has been verified, the security manager should "contain" the incident by isolating compromised systems, networks, or accounts to prevent further damage and preserve evidence, then move on to eradication and recovery phases to eliminate the threat and restore normal operations.
upvoted 1 times
...
Marcelus1714
8 months, 2 weeks ago
Selected Answer: B
You need to contact the right people in order to see how you can contain. What if it's a production system that cannot be isolated or similar? First ask then act
upvoted 1 times
...
e891cd1
8 months, 4 weeks ago
If they had said what does an Information security manager do it would be to escalate to stakeholders but it says what would you do after the incident has been verified..i think it clearly is testing your awareness of the incident response process in this instance specifically. my opinion tho.
upvoted 2 times
...
AlexJacobson
10 months ago
Selected Answer: C
Although you do have to wear you "manager hat" for this exam, I'm gonna go with C here, as it seems to me that the question is basically asking about the steps/phases of incident response. The question explicitly says that you have identified and confirmed the incident taking place giving you the initial phase of IR and asking "what now?". Well, the next step is to contain it and stop it from doing further damage and only then you inform the appropriate people. Note that question is quite vague when defining the incident - we don't know what type of incident it is (is it a ransomware, is someone breaking AUP by taking photos inside the secure environment, etc). So that's why it is very tempting to select B. Again, going with C, but not 100% sure.
upvoted 2 times
...
learntstuff
11 months, 1 week ago
I think a common issue is people are thinking in technical terms. We have to think as a manager. The manager isn't stopping anything, they're directing people under them to do their job. So I would say B is correct
upvoted 2 times
...
Cyberbug2021
12 months ago
Selected Answer: C
prevent further damage to the organization - then inform based on the incident response plan, escalation process and communication plan
upvoted 1 times
...
[Removed]
1 year ago
Selected Answer: B
Escalate and contain sometimes u need to escalate in order to contain
upvoted 1 times
...
Perseus_68
1 year, 1 month ago
I thought B as well, but what if there was an incident confirmed in a credit card database, first step is to notify the data owner. And incident doesn't mean attack, there may be nothing to contain.
upvoted 1 times
e891cd1
8 months, 4 weeks ago
there is always containment after an incident t his involves taking swift action to stop the attack, limit its spread, and mitigate its impact on the organization's systems, data, and operations.
upvoted 1 times
...
...
oluchecpoint
1 year, 2 months ago
C. Prevent the incident from creating further damage to the organization. While all the options listed are important, preventing further damage is the top priority. Once the incident has been confirmed, it's crucial to take immediate steps to contain and mitigate the threat to minimize any additional harm to the organization's systems, data, and reputation. After containment and mitigation efforts are underway, you can then proceed with the other steps, such as notifying law enforcement, informing key stakeholders, and conducting a forensic investigation to determine the root cause.
upvoted 1 times
...
todush
1 year, 3 months ago
Response B attending that the escalation process and communicated information allow the key stakeholders to assess the consequences of a containment on their operations. Otherwise response C is better.
upvoted 1 times
...
DavoA
1 year, 3 months ago
Selected Answer: C
Containment is the first step
upvoted 1 times
...
Andreu
1 year, 4 months ago
Selected Answer: C
The first phase after an incident has been detected is containment. Informing the required stakeholders according to the escalation procedures comes next.
upvoted 1 times
...
Monkey2173
1 year, 5 months ago
Selected Answer: C
On similar questions, when having a different phrasing for the general "incident" and stating explicitly "ransomware" the obvious answer was to contain the incident and prevent the incident from spreading
upvoted 1 times
...
Weldy_B
1 year, 5 months ago
Selected Answer: C
Containment
upvoted 1 times
...
richck102
1 year, 5 months ago
B. Follow the escalation process to inform key stakeholders.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...