exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 496 discussion

Actual exam question from Isaca's CISM
Question #: 496
Topic #: 1
[All CISM Questions]

An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

  • A. Restore the application and data from a forensic copy.
  • B. Install the OS, patches, and application from the original source.
  • C. Restore the OS, patches, and application from a backup.
  • D. Remove all signs of the intrusion from the OS and application.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jo_456
Highly Voted 1 year, 8 months ago
Selected Answer: B
After compromise, always reimage
upvoted 5 times
...
03allen
Most Recent 2 months, 3 weeks ago
awful question. ensuring the integrity of investigating or business operations?? Investigating is A, operations is B
upvoted 1 times
...
Thavee
4 months, 3 weeks ago
Selected Answer: C
Not a good question. The problems are 1. What has gone bad, Data or OS. 2. Restoring from backup, when was the backup. Was that a good backup? If the intrusion is indeed unknown the first date, reinstall the OS, reinstall the application, get the good known data from backup. I will stay with backup since the place I work does the hourly backup and disk dup.
upvoted 1 times
...
oluchecpoint
12 months ago
Selected Answer: A
A. Restore the application and data from a forensic copy. Restoring the system from a forensic copy ensures that you are using a known, clean, and unaltered version of the application and data. This is important because the original source (option B) and regular backups (option C) might also contain the same vulnerabilities or malware that allowed the intrusion in the first place. Option D, while important, is not sufficient on its own, as it may not guarantee the removal of all traces of the intrusion. Restoring from a forensic copy is a standard practice in digital forensics to ensure the integrity of the system and preserve evidence for further investigation if needed.
upvoted 2 times
Josef4CISM
2 months ago
I dont think that you are right. Forensic copies are made to preserve incident evidence and are created under chain of custody to yield court-ready evidence material. The use case of forensic copies is to understand what happened during the incident. The use case of forensic copies is NOT to have a clean source for restoration purposes. The right answer is B, since restoring the OS from a trusted source assures that the software packages are malware free. In case the incident was caused by a vulnerability, it is most likely that the vendor has either fixed the vulnerability or provided temporary workarounds for remediation purposes. Therefore, answer B is right.
upvoted 2 times
...
oluchecpoint
11 months, 1 week ago
Changing my answer to OPTION A
upvoted 1 times
oluchecpoint
11 months, 1 week ago
OPTION B
upvoted 3 times
...
...
...
richck102
1 year, 2 months ago
B. Install the OS, patches, and application from the original source.
upvoted 1 times
...
wello
1 year, 2 months ago
Selected Answer: B
fresh install from the original source is the best way.
upvoted 2 times
...
Saisharan
1 year, 3 months ago
I will go with Option A
upvoted 1 times
wello
1 year, 2 months ago
Forensics copies are made after the intrusion as evidence of the attack for later investigation. If I restore it, then we have the same problem.
upvoted 5 times
BennyMao
11 months, 3 weeks ago
Agreed. What you say makes total sense.
upvoted 2 times
...
...
...
Souvik124
1 year, 6 months ago
The BEST practice for ensuring the integrity of the recovered system after an intrusion has been detected and contained is to install the operating system (OS), patches, and applications from the original source (Option B).
upvoted 2 times
...
aokisan
1 year, 8 months ago
Selected Answer: B
need to OS install. should not use backup because it may be intruded.
upvoted 4 times
...
Ziggybooboo
1 year, 9 months ago
C for me
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago