An organization's outsourced firewall was poorly configured and allowed unauthorized access that resulted in downtime of 48 hours. Which of the following should be the information security manager's NEXT course of action?
A.
Reconfigure the firewall in accordance with best practices.
B.
Obtain supporting evidence that the problem has been corrected.
C.
Seek damages from the service provider.
D.
Revisit the contract and improve accountability of the service provider.
The correct answer is B: Obtain supporting evidence that the problem has been corrected. The reason this is true is because the problem has to be resolved. All the other questions leave the problem unaddressed.
A: What are best practices anyway? Plus this was outsourced to the provider anyway
B. This addresses the fact that the firewall was poorly configured.
C. While seeking damages from the provider is important. The first thing that should be done is to address the problem.
D. While seeking to revisit the contract and improve it for accountability is important... the problem needs to be addressed first.
Clearly B.
Is NOT A, the manager does not configure firewalls, and even less if it's outsourced
Is NOT D, the service provider never is accountable (responsible, yes).
B. Obtain supporting evidence that the problem has been corrected.
Before taking any further steps, it's crucial to ensure that the issue has been addressed and that the firewall is now properly configured to prevent unauthorized access. This involves verifying that the changes made align with best practices and are effective in enhancing security.
Outsourcing information security functions does not relieve the organization of its responsibility to ensure the confidentiality, integrity, and availability of its information. While reconfiguring the firewall is important to ensure that the unauthorized access is prevented in the future, the organization needs to first revisit the contract with the service provider to ensure that the service provider is held accountable for their poorly configured firewall.
i think is B. firewall is outsourced, if we have a evidence that the problem has been corrected, therefore is okay and if this attack come again we can Seek damages from the service provider.
My choice is B. Out of the hundreds of questions I have done, every time there is an answer that "validates," "confirms," "reaffirms," or "confirms" that an issue has been resolved, this is the answer.
A. Reconfigure the firewall in accordance with best practices.
The first step the information security manager should take is to address the immediate issue at hand, which is the poorly configured firewall that allowed unauthorized access and caused downtime. Reconfiguring the firewall in accordance with best practices will help to prevent a similar incident from occurring in the future. After that, they can move forward with obtaining supporting evidence that the problem has been corrected, revisiting the contract and improving accountability of the service provider, and potentially seeking damages from the service provider.
But the firewall is outsourced. The infosec manager should not reconfigure him/herself
upvoted 9 times
...
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
dark_3k03r
Highly Voted 1 year, 7 months agoCyberbug2021
12 months agoSalilgen
9 months agodavidcook
Most Recent 2 months, 1 week agonuel_12
7 months, 2 weeks agoMarcelus1714
9 months, 1 week agooluchecpoint
1 year, 2 months agorichck102
1 year, 5 months agobambs
1 year, 7 months agoCarlPTY07
1 year, 8 months agoSIMTEIN
1 year, 9 months agoProspect57
1 year, 10 months agoBroesweelies
1 year, 10 months agovavofa5697
1 year, 9 months ago