exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 247 discussion

Actual exam question from Isaca's CISM
Question #: 247
Topic #: 1
[All CISM Questions]

Which of the following is an information security manager's FIRST priority after a high-profile system has been compromised?

  • A. Implement improvements to prevent recurrence.
  • B. Identify the malware that compromised the system.
  • C. Restore the compromised system.
  • D. Preserve incident-related data.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
D2D2
Highly Voted 1 year, 7 months ago
Selected Answer: D
The answer is D, First step is to Contain/Preserve.
upvoted 6 times
ats20
5 months, 2 weeks ago
Preserving evidence/data ensures that the organization can analyze the incident effectively, identify the root causes, and determine the extent of the compromise.
upvoted 2 times
...
Funshykay
1 year, 6 months ago
Agreed with D.
upvoted 1 times
...
...
CarlPTY07
Highly Voted 1 year, 3 months ago
Selected Answer: C
Team, the priority is to go back to business! And we can preserve the evidence for future analysis is great, but the business is first. So, the first priority is to be back online!
upvoted 5 times
...
realmjmj
Most Recent 1 week, 1 day ago
Selected Answer: C
As an information security manager, restoring the "high profile" system to support business is 1st priority. Preserving incident-related data may take much time that businesses wouldn't tolerate.
upvoted 1 times
...
Chaser
1 month, 3 weeks ago
Restoring the system would compromise the preservation of data it is D.
upvoted 2 times
...
Marcelus1714
3 months, 3 weeks ago
Selected Answer: D
come on... first contain/preserve data and later restore..
upvoted 1 times
Marcelus1714
3 months, 3 weeks ago
re reading it says "First Priority", not "First action to do", first priority is get back to the business... maybe is C, yes.
upvoted 1 times
...
...
Salilgen
4 months, 1 week ago
Selected Answer: D
Before restore you must implement improvements to prevent recurrence. Before implement improvement you must identify the malware that compromised the system. To identify the malware you must use incident relate data. Then, FIRST is D
upvoted 1 times
...
haskelatchi
4 months, 3 weeks ago
How is this not C? I am very confused
upvoted 1 times
...
sm24
5 months ago
Wont the first step of Incident Response is Identification ?
upvoted 1 times
...
jcisco123
6 months, 1 week ago
Selected Answer: D
As an information security manager, you need to preserve the data to make sure further investigation can be done property. The data might be needed in future to provide as evidence. Fixing the system is something which can be done in parallel by technical team - it's not a job of information security manager!
upvoted 3 times
...
Learner76
6 months, 4 weeks ago
Selected Answer: C
C - For all technical folks we will choose to do identification and investigations but putting on the business hat (CISM is a business paper) getting the system up and meet business objectives is higher priority.
upvoted 4 times
...
killainc
6 months, 4 weeks ago
The FIRST priority for an information security manager after a high-profile system has been compromised is typically to preserve incident-related data. Preserving data is crucial for conducting a thorough forensic investigation to understand the extent of the compromise, identify the root cause, and gather evidence. Preserving the integrity of incident-related data helps ensure that the organization can conduct a proper post-incident analysis, and it may be essential for legal and regulatory purposes. While the other options (A, B, C) are important steps in incident response, preserving incident-related data is foundational to the entire investigation process.
upvoted 1 times
...
oluchecpoint
10 months ago
D. Preserve incident-related data. Preserving incident-related data is crucial because it allows for a thorough investigation to determine the scope and impact of the compromise. Without preserving evidence and data related to the incident, it becomes challenging to understand how the breach occurred, what data or systems were affected, and who may have been responsible. This information is essential for making informed decisions about how to respond, recover, and implement improvements to prevent recurrence (option A) effectively. Once the incident-related data is preserved, the manager can then proceed with identifying the malware, restoring the compromised system, and implementing improvements to prevent future incidents.
upvoted 1 times
...
AomineDaiki
10 months, 1 week ago
Serious question. Why is it not B? Don't you have to identify the kind of attack first before doing anything else?
upvoted 2 times
...
Akam
11 months ago
Selected Answer: C
For a reason it's saying high-profile, in order to select C. You need to restore and get back to business ASAP. One day I read an article mentioning it was estimated Amazon will lose 4 million dollars for each 15 minutes when their services are not available, so do you think they tend to wait multiple 15 minutes to just preserve the incident related data? or they would like to restore ASAP?
upvoted 2 times
...
Goseu
11 months, 2 weeks ago
Selected Answer: C
I like C here, please stop posting ChatGPT or other related AI answers here .
upvoted 2 times
...
wello
1 year ago
Selected Answer: D
the FIRST priority for an information security manager after a high-profile system has been compromised is to preserve incident-related data. This ensures that crucial evidence is secured and available for analysis, facilitating effective incident response, forensic investigations, and subsequent steps such as system restoration, identification of the malware, and implementing improvements to prevent recurrence.
upvoted 2 times
...
richck102
1 year, 1 month ago
D. Preserve incident-related data.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago