exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 699 discussion

Actual exam question from Isaca's CISM
Question #: 699
Topic #: 1
[All CISM Questions]

Which of the following is MOST useful to an information security manager when conducting a post-incident review of an attack?

  • A. Cost of the attack to the organization
  • B. Location of the attacker
  • C. Details from intrusion detection system (IDS) logs
  • D. Method of operation used by the attacker
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Manzer
Highly Voted 1 year, 8 months ago
Selected Answer: D
Method is the most important.
upvoted 15 times
...
Broesweelies
Highly Voted 1 year, 6 months ago
Selected Answer: C
The information in the IDS logs provides a comprehensive view of the attack, including the type of attack, the time it occurred, the location of the attack, and other relevant details. This information helps the information security manager to: Verify the attack and its impact: By reviewing the IDS logs, the security manager can determine the exact nature of the attack, the extent of the damage, and the systems or data that were impacted. Determine the root cause of the attack: The logs can provide valuable insights into the methods and techniques used by the attacker, allowing the security manager to identify the weaknesses that were exploited and take steps to remediate them. Evaluate the effectiveness of existing security measures: The information in the logs can help the security manager to determine the effectiveness of existing security controls, such as firewalls, intrusion detection systems, and access controls, in detecting and preventing the attack.
upvoted 8 times
wello
1 year, 2 months ago
IDS does not have all the information.
upvoted 1 times
...
...
Josef4CISM
Most Recent 1 month, 2 weeks ago
Selected Answer: D
Method of operation is the more comprehensive answer. Method of operation includes the procedures used by the adversaries, what vulnerabilities were exploited and what techniques the attacker used. It may also involve an assessment of the current controls to check for effectoveness. Answer option C is not entirely wrong - but from IDS logs you only see a fraction of what the attacker did. It's a very limited view from a single datasource - hence answer D is right.
upvoted 1 times
...
AlexJacobson
7 months, 1 week ago
Selected Answer: D
Guys, THINK LIKE A MANAGER! Do you really think an infosec manager is gonna go through the logs, or is he gonna tell some analyst to go through them and then, based on that, tell the infosec manager what were the methods that attacker has used?
upvoted 3 times
...
maisarajarrah
8 months ago
Selected Answer: C
Selected Answer: C
upvoted 1 times
...
blehbleh
8 months ago
Selected Answer: D
I am going to go with D. An IDS isn't successful all the time so if that aspect the method still needs to be identified therefore making me choose D.
upvoted 2 times
...
blehbleh
8 months ago
I find that D or C could be correct. The IDS logs can encompass what methods or attacks were used by the attacker but an IDS isn't successful 100% of the time. Therefore, the method still needs to be identified making D the correct answer. This is a bad question in my opinion.
upvoted 1 times
...
Balajipossible
10 months, 3 weeks ago
IDS gives the information on how hacker entered the network which is most useful in Incident review.
upvoted 1 times
...
Kunzle
11 months, 3 weeks ago
Selected Answer: D
Understanding the method of operation (often referred to as the modus operandi or tactics, techniques, and procedures - TTPs) used by the attacker is crucial. It allows the organization to determine vulnerabilities that were exploited, review the effectiveness of current controls, and make necessary adjustments to prevent similar future attacks.
upvoted 5 times
...
Goseu
1 year, 1 month ago
Selected Answer: D
D .is correct.
upvoted 1 times
...
richck102
1 year, 1 month ago
D. Method of operation used by the attacker
upvoted 1 times
...
zero46
1 year, 2 months ago
Selected Answer: D
Not all incidents are covered by IDS
upvoted 2 times
...
karanvp
1 year, 2 months ago
Option C covers B and D
upvoted 1 times
...
rbg8
1 year, 3 months ago
Selected Answer: D
Method because from that you can learn and optimize the systems for preventention.
upvoted 3 times
...
mad68
1 year, 3 months ago
Selected Answer: C
When conducting a post-incident review of an attack, the MOST useful information for an information security manager would be: C. Details from intrusion detection system (IDS) logs. In a post-incident review, analyzing the details from intrusion detection system (IDS) logs can provide valuable insights into the attack. IDS logs can contain information about the attack vector, the specific techniques used by the attacker, and the compromised systems or data. By reviewing IDS logs, the information security manager can gain a better understanding of the attack's scope, impact, and potential vulnerabilities exploited.
upvoted 1 times
...
Souvik124
1 year, 6 months ago
Details from intrusion detection system (IDS) logs are the most useful to an information security manager when conducting a post-incident review of an attack.
upvoted 1 times
...
Souvik124
1 year, 6 months ago
C it is
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago