exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 557 discussion

Actual exam question from Isaca's CISM
Question #: 557
Topic #: 1
[All CISM Questions]

Signature based anti-malware controls are MOST effective against:

  • A. poorly configured firewall rules.
  • B. reused virus code.
  • C. known threats.
  • D. zero-day exploits.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
CarlLimps
Highly Voted 1 year, 4 months ago
Selected Answer: B
My two cents. I like B. Signature based AV is all about detecting what's already been identified and used and...there's a signature to detect it. Just because you have a known threat, doesn't mean you have a signature for it. Good luck.
upvoted 14 times
...
yottabyte
Most Recent 3 months, 3 weeks ago
Selected Answer: C
C is a no brainer.
upvoted 1 times
...
AlexJacobson
5 months, 2 weeks ago
Selected Answer: C
Another rule for CISM (and CISSP for that matter): When you're presented with two fundamentally correct answers, go for a more comprehensive one (i.e. the one that includes the other). Sincerely, Cpt. Obvious :D
upvoted 2 times
...
Uncle_Lucifer
7 months, 1 week ago
Selected Answer: C
Threats is encompassing compared to just virus. C
upvoted 3 times
d7a2ba6
3 weeks, 4 days ago
True, but the question is about "anti-malware". Not SQLi protection or firewall filtering, not DDoS protection...
upvoted 1 times
...
...
Soleandheel
7 months, 3 weeks ago
C. known threats.
upvoted 2 times
...
Marcovic00
7 months, 3 weeks ago
Selected Answer: C
B is in C
upvoted 2 times
...
acf4e9a
8 months, 4 weeks ago
Selected Answer: C
Although the answer B us attractive, it is very particular to virus whereas there are different types of malwares like worms, trojans etc which would make the option C more suitable that covers all type of known threats rather than just virus category alone.
upvoted 1 times
...
bradseth
9 months, 1 week ago
Selected Answer: C
google, openai and claude all says C. so this is C.
upvoted 1 times
...
koala_lay
10 months ago
Selected Answer: C
C. known threats. Signature-based anti-malware controls are designed to detect and block known threats. These controls use a database of signatures or patterns associated with known malware to identify and block malicious files or code. When a file or code matches a signature in the database, the anti-malware software can take appropriate action, such as quarantining or deleting the file. Poorly configured firewall rules (A) and reused virus code (B) are not directly related to the effectiveness of signature-based anti-malware controls. Firewall rules are network-level controls that regulate incoming and outgoing traffic, while reused virus code refers to the practice of using existing malicious code in new malware. However, signature-based anti-malware controls can complement firewall rules and help detect and block malware, including instances of reused virus code.
upvoted 2 times
...
oluchecpoint
10 months, 1 week ago
Selected Answer: B
Option B
upvoted 1 times
...
[Removed]
11 months, 3 weeks ago
Selected Answer: B
threats can be DDOS too. how can AV protect against ddos
upvoted 1 times
...
Goseu
11 months, 4 weeks ago
Selected Answer: C
C .known threats .
upvoted 1 times
[Removed]
11 months, 3 weeks ago
wrong. threats can be non malware. how can antivirus block DDOS threats?
upvoted 2 times
Goseu
11 months, 2 weeks ago
Your point makes sense.
upvoted 1 times
Marcelus1714
5 months, 2 weeks ago
nowhere says that Antivirus should be affective against ALL the known threats
upvoted 1 times
Marcelus1714
5 months, 2 weeks ago
additionally if it's signature based, the AV will detect hashes, if you reuse code, you are not using a known hash, just getting part of the code that will generate other hash
upvoted 1 times
...
...
...
...
...
richck102
1 year ago
C. known threats.
upvoted 2 times
...
Jae_kes
1 year ago
Selected Answer: C
C. known threats.
upvoted 1 times
...
bambs
1 year, 5 months ago
Selected Answer: C
Definitely C
upvoted 1 times
...
aokisan
1 year, 6 months ago
Selected Answer: C
Clearly, C.
upvoted 2 times
...
Manzer
1 year, 7 months ago
Selected Answer: C
It's known.
upvoted 2 times
Ziggybooboo
1 year, 6 months ago
Agreed
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago