exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 183 discussion

Actual exam question from Isaca's CISM
Question #: 183
Topic #: 1
[All CISM Questions]

An employee is found to be using an external cloud storage service to share corporate information with a third-party consultant, which is against company policy.
Which of the following should be the information security manager's FIRST course of action?

  • A. Block access to the cloud storage service
  • B. Determine the classification level of the information
  • C. Seek business justification from the employee
  • D. Inform higher management of a security breach
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
helg420
5 months, 1 week ago
Selected Answer: B
B. Determine the classification level of the information The information security manager's first course of action should be to determine the classification level of the information that has been shared via the external cloud storage service. Understanding the sensitivity and classification of the information involved is crucial to assess the potential risk and impact of the policy violation. This assessment will guide subsequent steps and decisions, including whether to involve higher management, to block access to the service, or to seek a business justification from the employee. By prioritizing the identification of the information's classification level, the information security manager can ensure that the response is proportional to the level of risk posed by the unauthorized sharing.
upvoted 2 times
...
nuel_12
6 months, 2 weeks ago
Selected Answer: B
B is the first choice of action
upvoted 1 times
...
e891cd1
7 months ago
B..Determine the classification then you have to assess the risk then you can do policy assessment that may learn to blocking the website, user training or disciplinary actions.. You can't contain the incident since the security manager is part of the risk department and not the IT administration team in most cases.
upvoted 2 times
...
afoo1314
7 months ago
Selected Answer: B
If you block the cloud storage provider, then the user will seek for alternative cloud storage provider. Plus that cloud storage might be a services use by other customer sending information to the company. 1st need to determine the classification of the data then only decide if escalation or justification require.
upvoted 1 times
...
shervin2s
7 months ago
Selected Answer: A
First containment
upvoted 1 times
...
Learner76
10 months, 4 weeks ago
Selected Answer: B
Understand the data classification then take the appropriate action
upvoted 3 times
...
darxide1
11 months, 1 week ago
Selected Answer: A
stop sharing sensitive information
upvoted 1 times
...
POWNED
11 months, 2 weeks ago
Selected Answer: A
This is an incident first thing that needs to be done is contain it. That is always the first response to an incident. A
upvoted 4 times
...
oluchecpoint
1 year, 1 month ago
B. While blocking access to the cloud storage service (A) and seeking business justification from the employee (C) are important actions to consider, they should come after the initial assessment of the data's classification to ensure that the response is proportionate to the sensitivity of the information. Informing higher management of a security breach (D) may not be necessary at this stage if it is not yet clear whether a breach has occurred; the situation should be assessed first.
upvoted 1 times
...
[Removed]
1 year, 2 months ago
Selected Answer: C
Page 71, Section: "Information Asset Classification and Protection" It states: "When a violation of policy is detected, it is important to first understand the business reason for the action before taking punitive measures. It may be that the employee was trying to meet a business need in the best way they knew how, or they may not have been aware of the policy."
upvoted 3 times
AlexJacobson
9 months ago
This definitely happens after B and even A.
upvoted 1 times
...
...
karanvp
1 year, 4 months ago
B: He may be sharing public sharable Marketing documents; hence need to classify the information first before taking further actions.
upvoted 2 times
...
richck102
1 year, 4 months ago
B. Determine the classification level of the information
upvoted 1 times
...
DASH_v
1 year, 4 months ago
Selected Answer: A
The question already stated the employee has violated the company policy, the first course of action is stop bleeding.
upvoted 4 times
DASH_v
1 year, 4 months ago
From GPT4 C. Seek business justification from the employee The information security manager's first course of action should be to seek business justification from the employee. This will help the manager understand the employee's rationale for using the external cloud storage service and determine if there was a legitimate business need. Based on the employee's response, the manager can then decide on the appropriate next steps, such as blocking access to the cloud storage service, determining the classification level of the information, or informing higher management of a security breach if necessary.
upvoted 1 times
DASH_v
1 year, 4 months ago
From field experience, it would be good to talk with Compliance or user's supervisor first to rather than talk to the employee directly (could be an insider with made other violations that have not been detected.) So maybe B is more appropriate but not by talking to the employee directly.
upvoted 2 times
...
...
...
dedfef
1 year, 7 months ago
Selected Answer: B
b. need to know how data is classified to know if it is important
upvoted 1 times
...
Broesweelies
1 year, 9 months ago
Selected Answer: B
The information security manager's first course of action should be B. Determine the classification level of the information. This is important as it will help understand the nature of the data that has been shared, and the level of risk associated with it. This information will be used to determine the extent of the damage and the appropriate course of action. Additionally, it will allow the security manager to identify any other data that may have been shared and take the necessary steps to prevent further data leakage. Once the security manager has determined the classification level of the information, they can then take appropriate action such as seeking business justification, blocking access to the cloud service, and informing higher management of a security breach if necessary.
upvoted 3 times
...
aokisan
1 year, 10 months ago
Selected Answer: D
it's clearly against the policy. So need to announce to higher position.
upvoted 1 times
Ziggybooboo
1 year, 10 months ago
I would want the detail of classification first so I can explain to upper management
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago