Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 161 discussion

Actual exam question from Isaca's CISM
Question #: 161
Topic #: 1
[All CISM Questions]

What is the FIRST line of defense against criminal insider activities?

  • A. Signing security agreements by critical personnel
  • B. Stringent and enforced access controls
  • C. Validating the integrity of personnel
  • D. Monitoring employee activities
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
lebigninpo
Highly Voted 1 year, 11 months ago
Selected Answer: C
We talk about "First line" of defense, and it is "Validating the integrity" of personel instead of monitoring their activities that come after.
upvoted 7 times
Ziggybooboo
1 year, 11 months ago
Agreed
upvoted 1 times
...
jaiz
1 year, 8 months ago
Agree. Background check and validation is the first line of defense..
upvoted 2 times
...
AlexJacobson
10 months ago
Agreed! "Validating integrity" basically means screening/background checks.
upvoted 1 times
oluchecpoint
9 months, 3 weeks ago
you can validate but the inside intruder can change there behaviour. Along time fix is to implement access control
upvoted 1 times
...
...
...
D2D2
Highly Voted 1 year, 11 months ago
Selected Answer: C
First line of defense is validating the integrity of personnel. It is covered under the review manual.
upvoted 5 times
...
buddhika2010
Most Recent 3 months ago
Selected Answer: D
I Believe answer should be D since it consistency monitoring using SIEM solution such as UEBA activities which will help to detect the deviation of the normal operation user is doing
upvoted 1 times
...
Graceadel
7 months ago
They are insiders (workers)so they have rightfully access to data and organization systems. D is the right answers
upvoted 1 times
...
WibbleMyFins
7 months, 3 weeks ago
Whoever decided on D as the answer has obviously never had to work in a company with a Works Council. This would never be approved as a first line of defence
upvoted 1 times
...
Marcelus1714
8 months, 3 weeks ago
Selected Answer: C
I believe the order would be: C validate the integrity of the people you are hiring, then: B, you have a good access control D, you monitor the activity So the FIRST is C..
upvoted 1 times
...
AlexJacobson
10 months ago
Selected Answer: C
"First line of defense" implying defense in depth. So first you do background checks, then you implement the rest. Therefore C.
upvoted 2 times
Salilgen
9 months ago
I agree. Indeed, if staff are dishonest, identity verification and access control will not prevent criminal activity.
upvoted 1 times
...
...
blehbleh
10 months, 2 weeks ago
Selected Answer: B
I believe the answer is B. The way I am reading it is they are already on boarded and hired and the vetting process did not work. So in that case you need access controls. The wording here makes it more difficult. Seems like a poorly written question and having two answers that could potentially be correct makes it even worse.
upvoted 1 times
...
SHERLOCKAWS
11 months, 1 week ago
Selected Answer: B
B. Stringent and enforced access controls
upvoted 1 times
...
Alain_R
1 year, 2 months ago
Selected Answer: D
FIRST line of defense against criminal insider activities, it means the criminal is already doing something, so first line it's monitoring. The other options are not effective when insider is in action.
upvoted 1 times
Cyberbug2021
12 months ago
monitoring is not a Defense
upvoted 2 times
...
...
oluchecpoint
1 year, 2 months ago
B. Stringent and enforced access controls are the FIRST line of defense against criminal insider activities. Access controls are fundamental security measures that aim to restrict and manage access to critical systems, data, and resources within an organization. They are the primary means of preventing unauthorized individuals, including insiders with malicious intent, from accessing sensitive information or performing unauthorized actions.
upvoted 1 times
...
DavoA
1 year, 3 months ago
Selected Answer: B
B. Stringent and enforced access controls.
upvoted 1 times
...
Goseu
1 year, 4 months ago
Selected Answer: B
I like B here .C would be nice as well.
upvoted 1 times
...
sham222
1 year, 4 months ago
Selected Answer: B
Just remember that anyone in a company that's ever stolen or leaked data had previously passed that company's background checks. It's not enough. The ONLY defense is securing your system and it should be the first thing that's done. A clear background check merely tells you that someone's never been caught...lol.
upvoted 1 times
...
Jae_kes
1 year, 5 months ago
Selected Answer: B
B. Stringent and enforced access controls. Validating the integrity of personnel is an important measure in addressing insider threats, but it is not the first line of defense. While it is crucial to ensure that individuals with high levels of trust and integrity are hired and retained within an organization, relying solely on personnel validation may not be sufficient to prevent or detect criminal insider activities. Implementing stringent and enforced access controls is considered the first line of defense because it focuses on controlling and limiting access to sensitive information and resources. Access controls help prevent unauthorized access and restrict individuals' privileges based on their roles and responsibilities.
upvoted 1 times
buddhika2010
3 months ago
What if the malicious user is an administrator who has the administrative privileges where he has the password and credentials login to the critical systems. does the answer B makes sense
upvoted 1 times
...
...
wello
1 year, 5 months ago
Selected Answer: C
Validating the integrity of personnel involves conducting thorough background checks, screening processes, and establishing trust in the individuals being hired or granted access to sensitive information or critical systems. By ensuring that individuals with a history of criminal activity or unethical behavior are not granted access to sensitive resources, organizations can mitigate the risk of insider threats.
upvoted 4 times
buddhika2010
3 months ago
What if the user become angry and frustrated employee and start doing the malicious or sabotage activities where he has administrative privileges or have trusted personal after working over 10 within the organization.
upvoted 1 times
...
...
richck102
1 year, 5 months ago
B. Stringent and enforced access controls
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...