Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 22 discussion

Actual exam question from Isaca's CISM
Question #: 22
Topic #: 1
[All CISM Questions]

Which of the following is the MOST important security consideration when developing an incident response strategy with a cloud provider?

  • A. Security audit reports
  • B. Recovery time objective (RTO)
  • C. Technological capabilities
  • D. Escalation processes
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 3 months ago
Selected Answer: D
From the CISM Review Manual, 15th Edition, by ISACA: "Incident response strategies need to have clear and well-defined escalation processes. This is especially true when dealing with cloud providers where the client company may have little or no control over the actual infrastructure where their data is stored and processed. If an incident occurs, it is vital that the cloud provider can be quickly and effectively alerted, and that there is a clearly defined process for how the cloud provider will respond to and communicate during such incidents. The escalation process needs to clearly outline who should be contacted, how they should be contacted, what information should be provided, and what the next steps are in the incident response process."
upvoted 18 times
AlexJacobson
10 months ago
Also it says "incident response STRATEGY", meaning you're looking at the whole process. And the most important thing out of all answers presented is the option. D
upvoted 2 times
...
Soleandheel
1 year ago
Spot on!
upvoted 1 times
...
...
Parley
Most Recent 3 months, 1 week ago
Think as a manager D
upvoted 1 times
...
oluchecpoint
9 months, 3 weeks ago
Selected Answer: D
D While elements such as security audit reports, recovery time objectives (RTO), and technological capabilities are important, they are often dependent on effective escalation processes. Proper escalation ensures that the right people are aware of the incident and can make informed decisions about how to proceed. Without effective escalation, even the best technological capabilities and security measures might not be effectively utilized during an incident.
upvoted 2 times
...
Manix
10 months ago
Selected Answer: B
RTO is one of inc mng outcomes, while escallation process is element of inc mng plan
upvoted 1 times
...
Creations
10 months, 2 weeks ago
I think I will go for D because the question is relating to "incident response strategy" which clearly is process thing
upvoted 1 times
...
UnoMigz
11 months, 2 weeks ago
Selected Answer: B
RTO. Escalation process can't negotiate with Google or Microsoft like cloud provider. RTO should be set as a wholistic approach
upvoted 1 times
...
Cyberbug2021
12 months ago
Selected Answer: B
Recovery time objective (RTO) is an integral part of incident response strategy. RTO defines the maximum acceptable duration of downtime following an incident, representing the time it takes to restore critical business operations to a functional state. In essence, RTO establishes the organization's tolerance for disruption and serves as a benchmark for measuring the effectiveness of incident response efforts. A well-defined RTO plays a crucial role in incident response strategy by: Setting Expectations: RTO clearly communicates the organization's priorities and expectations regarding recovery timelines, ensuring that all stakeholders are aligned on the desired level of resilience.
upvoted 2 times
Cyberbug2021
12 months ago
Guiding Response Efforts: RTO serves as a guiding principle for incident response teams, directing their actions towards achieving the organization's recovery targets. It helps prioritize tasks and allocate resources effectively. Measuring Success: RTO provides a quantifiable metric for evaluating the effectiveness of incident response efforts. By comparing actual recovery times to the RTO, organizations can assess their incident response capabilities and identify areas for improvement. Informing Business Continuity Planning: RTO informs business continuity planning (BCP) by establishing the organization's tolerance for downtime and guiding the development of recovery procedures.
upvoted 1 times
Cyberbug2021
12 months ago
Supporting Risk Management: RTO contributes to risk management by providing a framework for assessing and mitigating the potential impact of incidents. It helps organizations understand the financial and operational consequences of downtime.
upvoted 1 times
Cyberbug2021
12 months ago
Recovery time objective (RTO) is an integral part of incident response strategy. RTO defines the maximum acceptable duration of downtime following an incident, representing the time it takes to restore critical business operations to a functional state. In essence, RTO establishes the organization's tolerance for disruption and serves as a benchmark for measuring the effectiveness of incident response efforts. A well-defined RTO plays a crucial role in incident response strategy by: Setting Expectations: RTO clearly communicates the organization's priorities and expectations regarding recovery timelines, ensuring that all stakeholders are aligned on the desired level of resilience.
upvoted 1 times
...
...
...
...
Viperhunter
1 year ago
Selected Answer: C
When working with a cloud provider, it is crucial to assess their technological capabilities related to incident response. This includes their ability to detect and respond to security incidents, the availability of logging and monitoring tools, and the overall security features of their cloud platform. Understanding the technological capabilities of the cloud provider is fundamental to developing an effective incident response strategy that aligns with the shared responsibility model in cloud computing. While other factors, such as security audit reports (option A), recovery time objective (RTO) (option B), and escalation processes (option D), are important considerations, the provider's technological capabilities play a central role in incident detection, response, and overall security posture within the cloud environment.
upvoted 1 times
...
Soleandheel
1 year ago
From the CISM Review Manual, 15th Edition, by ISACA: "Incident response strategies need to have clear and well-defined escalation processes. This is especially true when dealing with cloud providers where the client company may have little or no control over the actual infrastructure where their data is stored and processed. If an incident occurs, it is vital that the cloud provider can be quickly and effectively alerted, and that there is a clearly defined process for how the cloud provider will respond to and communicate during such incidents. The escalation process needs to clearly outline who should be contacted, how they should be contacted, what information should be provided, and what the next steps are in the incident response process."
upvoted 1 times
...
Mod7
1 year, 1 month ago
Selected Answer: D
The most important security consideration should be a clear stated of roles and responsibilities of the client and the provider. This will facilitate proper definition of the escalation process
upvoted 2 times
...
oluchecpoint
1 year, 2 months ago
D While elements such as security audit reports, recovery time objectives (RTO), and technological capabilities are important, they are often dependent on effective escalation processes. Proper escalation ensures that the right people are aware of the incident and can make informed decisions about how to proceed. Without effective escalation, even the best technological capabilities and security measures might not be effectively utilized during an incident.
upvoted 3 times
...
sham222
1 year, 3 months ago
Selected Answer: C
B and D deal with incident response, are are not SECURITY considerations. However CONTROLS determine the capability of the CSP to be able to actually detect security incidents, therefore that is the only option that addresses the question. You have to read these carefully. The key to this one is the wording "security consideration".
upvoted 2 times
...
Goseu
1 year, 4 months ago
Selected Answer: D
I would say D
upvoted 4 times
...
DavoA
1 year, 4 months ago
Selected Answer: D
The focus is on " incident response"
upvoted 4 times
...
Jae_kes
1 year, 5 months ago
The MOST important security consideration when developing an incident response strategy with a cloud provider is the technological capabilities (C). This refers to the cloud provider's infrastructure, tools, and security features that support incident response activities. It is crucial to assess the cloud provider's ability to detect, respond to, and mitigate security incidents effectively. This includes evaluating their incident response mechanisms, incident handling procedures, and incident reporting capabilities. While security audit reports (A), recovery time objective (RTO) (B), and escalation processes (D) are all important factors to consider, they are secondary to the provider's technological capabilities in terms of incident response readiness and effectiveness.
upvoted 1 times
...
jjj378
1 year, 5 months ago
Selected Answer: B
Recovery time objective (RTO)
upvoted 1 times
...
richck102
1 year, 6 months ago
C. Technological capabilities
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...