exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 373 discussion

Actual exam question from Isaca's CISM
Question #: 373
Topic #: 1
[All CISM Questions]

An organization that has outsourced its incident management capabilities just discovered a significant privacy breach by an unknown attacker. Which of the following is the MOST important action of the information security manager?

  • A. Follow the outsourcer's response plan
  • B. Refer to the organization's response plan
  • C. Notify the outsourcer of the privacy breach
  • D. Alert the appropriate law enforcement authorities
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MyKasala
Highly Voted 2 years, 1 month ago
Selected Answer: B
I think B
upvoted 8 times
...
Josef4CISM
Most Recent 1 month, 3 weeks ago
Selected Answer: B
B is right: Although the organization outsourced the process, the organization is still accountable of the breached data. Therefore, it should activate its own IR plan and, which should include IR activities with the vendor together.
upvoted 2 times
...
e891cd1
8 months, 3 weeks ago
B. Referring to the organizations plan might be to notify the outsourcer or the incident.
upvoted 1 times
...
d3fa4d2
10 months, 2 weeks ago
Selected Answer: B
Even though you notify the third party in this case. Who else will be involved and the communication plan, what next everything is documented in org's IR policy.
upvoted 1 times
...
AlexJacobson
1 year, 1 month ago
Selected Answer: C
I vote C. Privacy breach is a huge thing that elevates incident to another level. Since the questions states that company has outsourced its entire incident management capabilities, then the most important think it should do is to communicate to their incident management provider that privacy breach has occurred.
upvoted 4 times
Salilgen
1 year ago
C would be part of B. The reason you follow the organization response plan because it contains a series of steps on what to do. There may be an extra step such as notify the CEO before contacting the outsourcer.
upvoted 1 times
...
...
Craftymartha
1 year, 4 months ago
The company has outsourced it's incidence management capabilities so it wouldn't have an incident response plan; therefore the information security manager would notify the outsourcer of the privacy breach.
upvoted 1 times
...
oluchecpoint
1 year, 5 months ago
B. Refer to the organization's response plan It is crucial for the organization's information security manager to refer to the organization's own incident response plan first. This plan should outline the specific procedures and processes that the organization has established to respond to security incidents, including privacy breaches. Following the organization's response plan ensures that the incident is handled in alignment with the organization's internal policies, legal requirements, and best practices
upvoted 1 times
...
Agamennore
1 year, 6 months ago
Selected Answer: B
in my opinion is B because I assume that inside the response plan (if the company has outsourced the incident management services) there is the process to involve the supplier
upvoted 2 times
...
richck102
1 year, 8 months ago
B. Refer to the organization's response plan
upvoted 1 times
...
wello
1 year, 9 months ago
Selected Answer: B
when faced with a significant privacy breach, the information security manager should first refer to the organization's own response plan to ensure a structured and effective response. Notifying the outsourcer of the privacy breach (option C) is an important step, as they may have a role in supporting the incident response efforts or have contractual obligations related to incident reporting. However, it should be done in accordance with the organization's own response plan and in a coordinated manner.
upvoted 1 times
...
Saisharan
1 year, 9 months ago
the organization should have its own response plan that outlines the specific steps and actions to be taken in the event of a privacy breach. This plan would provide guidance on how to handle the incident, including notifying the appropriate stakeholders, conducting an investigation, containing the breach, and implementing remedial measures. So Option B is the correct one
upvoted 1 times
...
sedardna
1 year, 9 months ago
lOS DISPARADORES DEL PLAN PUEDEN ESTAR FUERA PERO EL PLAN ES DE LA ORGANIZACION, ISN IMPORTAR QUIEN LO GESTIONE
upvoted 1 times
...
Dravidian
1 year, 10 months ago
Selected Answer: B
Option B is the correct answer in my opinion since C and D are would be a part of the Organization's Incident Response Plan.
upvoted 1 times
...
dark_3k03r
1 year, 10 months ago
Selected Answer: B
The Correct Answer is (B) Refer to the organization's response plan. The first thing an organization should do is look at their incident response plan. Rationale: A. The organization can not outsource its responsibility to another organization. C. The outsourcer should only be contacted once the organization has been prepared and has a plan. D. Alert the appropriate law enforcement authorities should be part of the organization's incident response plan. This should be carefully evaluated cause once the organization calls the police the org loses control of the situation and thus should only be called once activated by the incident response plan.
upvoted 3 times
...
CarlPTY07
1 year, 12 months ago
Selected Answer: C
First let them know about the situation, they will follow their incident respond plan. (i.e. Contact authorities)
upvoted 1 times
xcjxcj
12 months ago
So your choice is B?
upvoted 1 times
...
...
Broesweelies
2 years ago
Selected Answer: D
Notifying the outsourcer of the privacy breach is certainly important, but it is not the most critical action in this scenario. The most important action for the information security manager would be to alert the appropriate law enforcement authorities. The reason for this is that a significant privacy breach by an unknown attacker may be a criminal act and requires immediate attention from law enforcement. Furthermore, reporting the incident to law enforcement can also help the organization gather information about the attacker, prevent further damage, and ensure the incident is properly investigated and resolved.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago