Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 103 discussion

Actual exam question from Isaca's CISM
Question #: 103
Topic #: 1
[All CISM Questions]

In a cloud technology environment, which of the following would pose the GREATEST challenge to the investigation of security incidents?

  • A. Non-standard event logs
  • B. Access to the hardware
  • C. Data encryption
  • D. Compressed customer data
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
MSKid
Highly Voted 2 years ago
Selected Answer: B
CISM AIO 2nd - "Acquiring Additional Hardware" section gives a good chart (7-7 Table) on pro's and con's as to why this answer is correct given the options
upvoted 7 times
dark_3k03r
1 year, 6 months ago
Expanding on MSKid, the correct answer is B cause trying to acquire additional hardware during an incident is nearly impossible as contracts, procurement, legal, etc.. will need to get involved. But with non-standard logs all you need to do is run it through a parser to normalize the logs and you should be fine. This is why (A) is not the answer. While encryption can be decrypted (C) and compression can be decompressed (D).
upvoted 2 times
CISSPST
1 year, 1 month ago
I mostly agree with your explanation for the wrong answers. B is the correct answer, but not because of the difficulty of acquiring additional hardware, because the question is specifically talking about investigation, not recovery. Unless it is a private cloud environment (and sometimes even if it is), taking bit-for-bit copy of hard-disk for instance may not be allowed because the resources are shared.
upvoted 6 times
...
...
...
alifjouj
Most Recent 2 months, 3 weeks ago
Selected Answer: B
in the cloud context it is almost impossible
upvoted 1 times
...
helg420
6 months, 2 weeks ago
Selected Answer: B
B. Access to the hardware In a cloud technology environment, one of the greatest challenges to the investigation of security incidents is access to the hardware. Cloud environments typically abstract the hardware layer from users, which means that customers do not have direct access to the physical servers, network equipment, or storage devices where their data is processed and stored. This limitation can significantly impede forensic investigations, as investigators may require physical access to gather evidence, analyze hardware configurations, or perform other forensic tasks that are simply not possible in a cloud setting where the infrastructure is managed by a service provider.
upvoted 2 times
...
Thavee
7 months, 3 weeks ago
Selected Answer: B
Standard or non standard Log is likely not an issue at all. All type of logs are never be the same but they are understandable. Otherwise, Linux /Var/log and Windows Event logs must be problematic. Access to the hardware is the challenge. I am in Country B, but the AWS cloud front I am using is at Country Z. Some how, we will never know where our applications are hosted (serverless).
upvoted 1 times
...
afoo1314
8 months, 1 week ago
Selected Answer: B
A and B is correct. But the question is in a "CLOUD" technology. Accessing to hardware is almost impossible.
upvoted 1 times
...
oluchecpoint
9 months, 2 weeks ago
Selected Answer: B
B. Access to the hardware In a cloud technology environment, access to the hardware poses the greatest challenge to the investigation of security incidents. In traditional on-premises environments, organizations have direct physical access to their hardware, making it relatively easier to conduct investigations and gather evidence in case of security incidents.
upvoted 1 times
...
POWNED
1 year ago
Just simple down the question... What is the greatest difficulty when dealing with cloud providers? This answer is always getting access to the physical hardware. Answer is B
upvoted 2 times
...
JJ1204
1 year, 1 month ago
C. Data encryption Data encryption is a significant challenge when investigating security incidents in a cloud environment because it can make it extremely difficult to access and analyze the data that is encrypted. If data is properly encrypted, even if an attacker gains access to it, they will not be able to decipher it without the encryption keys. This can hinder the investigation process, as investigators may not be able to determine the nature and extent of a security incident or breach. In contrast, the other options (A, B, and D) can also pose challenges but are typically more manageable compared to the encryption of data.
upvoted 1 times
...
Perseus_68
1 year, 1 month ago
Selected Answer: B
Getting your cloud provider to give you access to their servers or other hardware is next to impossible while non-standard logs are a challenge, you can solve that. B is the greatest challenge.
upvoted 1 times
...
sphenixfire
1 year, 2 months ago
Selected Answer: A
no every incident needs hw access, but usually logs
upvoted 1 times
...
oluchecpoint
1 year, 2 months ago
B. Access to the hardware In a cloud technology environment, access to the hardware poses the greatest challenge to the investigation of security incidents. In traditional on-premises environments, organizations have direct physical access to their hardware, making it relatively easier to conduct investigations and gather evidence in case of security incidents.
upvoted 1 times
...
Zenvega
1 year, 3 months ago
Selected Answer: A
The question said in a "CLOUD" environment. So access to underlying hardware "D" is incorrect and is typically managed and controlled by the cloud service provider, and customers do not have direct physical access to the hardware.
upvoted 2 times
...
sham222
1 year, 3 months ago
Selected Answer: A
A is correct. B is just crazy. Why would you need access to the hardware to investigate an incident? You think AWS is going to let their customers access their hardware? lolol. No customer gets access to the hardware. That's a moot option. It's not a challenge because it's not needed. Logs however are needed, and non-standard logs would make the investigation process more complex.
upvoted 3 times
...
wello
1 year, 5 months ago
Selected Answer: B
Access to the HW
upvoted 1 times
...
Saisharan
1 year, 5 months ago
While access to hardware is a significant challenge, the lack of standardized and consistent event logs (Option A) is generally considered a more pervasive and widespread challenge in cloud environments, as it affects multiple aspects of incident investigation and analysis. So Option would be A
upvoted 3 times
...
richck102
1 year, 5 months ago
B. Access to the hardware
upvoted 1 times
...
mad68
1 year, 6 months ago
Selected Answer: A
: In a cloud technology environment, non-standard event logs would pose the greatest challenge to the investigation of security incidents. Standardized event logs would provide a consistent source of information for security investigations and compliance audits. Non-standard event logs could be difficult to decipher or be incomplete, leading to gaps in security incident investigation.
upvoted 2 times
[Removed]
1 year, 4 months ago
stop using chatgpt for answers. they're wrong
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...