exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 361 discussion

Actual exam question from Isaca's CISM
Question #: 361
Topic #: 1
[All CISM Questions]

During the eradication phase of an incident response, it is MOST important to:

  • A. identify the root cause
  • B. restore from the most recent backup
  • C. notify affected users
  • D. wipe the affected system
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
afb4b17
1 month ago
Selected Answer: D
See the first sentence of CISM Exam Guide regarding Eradication " The eradication phase of security incident response is concerned with the removal of the agent or factors that caused or aided the incident." . Doing a root cause is part of the activities but the overall goal is removal/ wiping.
upvoted 3 times
...
e891cd1
2 months, 1 week ago
During the Eradication phase root cause analysis should be done
upvoted 1 times
...
Manix
5 months, 3 weeks ago
4.12.1 CISM REVIEW 16: A,B and D are correct anwers.
upvoted 1 times
...
FantasyDream
6 months, 1 week ago
Once you’ve contained the issue, you need to find and eliminate the root cause of the breach
upvoted 2 times
...
jcisco123
6 months, 2 weeks ago
Selected Answer: D
It talks about 'Eradication' phase which means all the other work (root cause etc.) are complete hence answer D.
upvoted 1 times
...
Jess20
7 months, 2 weeks ago
Selected Answer: A
A - identify the root cause
upvoted 1 times
...
oluchecpoint
10 months, 1 week ago
A. identify the root cause Identifying the root cause of the incident is crucial because it allows you to understand how the incident occurred in the first place. By identifying the root cause, you can take steps to prevent similar incidents from happening in the future. This knowledge is essential for effective incident response and long-term security improvement.
upvoted 2 times
...
Agamennore
10 months, 2 weeks ago
Selected Answer: A
Why to WIPE an entire system without a certain root-cause?!? The identification of a root cause is a fundamental part of eradication
upvoted 4 times
...
sham222
12 months ago
Selected Answer: D
from RSISecurity.com see the *** part How to Remove Threats During the Eradication Phase of Incident Response After identifying and analyzing the threats during the other incident phases, complete removal of those threats from your systems and periphery is the critical goal of the eradication phase. To do so, choose the eradication approach that is most appropriate for the threat, such as: Automated removal – If any minor threats can be removed by anti-malware tools, let the software remove them and focus on higher priority threats. ***Reimaging systems – Wipe systems and reimage them to ensure any malware is removed. Applying patches – Patch vulnerabilities that may have facilitated attacks or been introduced by threats detected within the environment. Migrating resources – Consider removing resources that weren’t affected during the incident to new systems to ensure they remain unaffected throughout the rest of the incident response process.
upvoted 1 times
...
Dopy
12 months ago
Selected Answer: D
• Preparation: No organization can spin up an effective incident response on a moment’s notice. A plan must be in place to both prevent and respond to events. • Detection and analysis: The second phase of IR is to determine whether an incident occurred, its severity, and its type. • Containment and eradication: The purpose of the containment phase is to halt the effects of an incident before it can cause further damage. • Post-incident recovery: A lessons learned meeting involving all relevant parties should be mandatory after a major incident and desirable after less severe incidents with the goal of improving security as a whole and incident handling in particular.
upvoted 2 times
...
richck102
1 year ago
D. wipe the affected system
upvoted 1 times
...
Saisharan
1 year, 1 month ago
During the eradication phase, the incident response team investigates the extent of the compromise, identifies the root cause of the incident, and takes necessary actions to remove any malicious presence, unauthorized access, or compromised components from the affected systems or network. So the correct answer is Option A
upvoted 1 times
...
Gr3yGh0sT
1 year, 2 months ago
Gonna go with D here - the root cause analysis should have been completed during the analysis phase, prior to containment. Hard to contain what you do not understand.
upvoted 1 times
...
Dravidian
1 year, 2 months ago
Selected Answer: D
Option D- Since eradication step has to ensure the threat has been eliminated. All other options are not part of the eradication step. A - Post-Op step, never seen anyone perform root cause in the middle of an active incident. B - Recovery step. If performed without proper eradication then the incident can surface again. C - Notifying the affected users would've already happened. Probably one of the first steps in Incident response.
upvoted 1 times
...
cheesesteak
1 year, 2 months ago
Selected Answer: A
Restoring from a backup, notifying affected users, and wiping the affected system are typically considered part of the containment and recovery phases of incident response, whereas identifying the root cause is a critical step in eradicating the incident and preventing its recurrence.
upvoted 1 times
...
dark_3k03r
1 year, 3 months ago
Selected Answer: A
The correct answer is (A) identifying the root cause. This is cause you have to know what the root cause is in order to truly eliminate the threat. If it is not properly scoped then the attacker may still be able to log in or use another system to move throughout the environment. Rationale: (B) Restoring a system from a backup does nothing to address other potential points an attacker may hop from. (C) notifying affected users without understanding the true scope of the incident may mislead users (D) wiping the affected system only stops the attacker at this particular system, but not all the other systems that haven't been identified cause the root cause hasn't been identified yet.
upvoted 2 times
...
CarlPTY07
1 year, 4 months ago
Selected Answer: D
ISACA: The eradication step of incident response involves direct actions (usually on the part of incident responders) to remove the source of the incident. This may include removing malware, blocking incoming and/or outgoing command and control messages, or removing an intruder.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago