Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 115 discussion

Actual exam question from Isaca's CISM
Question #: 115
Topic #: 1
[All CISM Questions]

The authorization to transfer the handling of an internal security incident to a third-party support provider is PRIMARILY defined by the:

  • A. escalation procedures.
  • B. information security manager.
  • C. chain of custody.
  • D. disaster recovery plan (DRP).
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Jess20
1 month ago
Selected Answer: A
A. Escalation procedures An information security manager cannot take that decision at the moment without following the procedure.
upvoted 1 times
...
oluchecpoint
9 months, 3 weeks ago
Selected Answer: A
A. Escalation procedures. Escalation procedures typically outline the steps and criteria for involving external parties, such as third-party support providers, in the incident response process. These procedures help determine when it's necessary to seek external expertise or assistance in mitigating and resolving a security incident. This could include scenarios where the incident exceeds the organization's in-house capabilities or expertise. Therefore, escalation procedures are the primary means for authorizing such transfers.
upvoted 1 times
...
Perseus_68
1 year, 1 month ago
Selected Answer: A
Keyword "defined" by, that is a procedure. If they stated "authorized" by, that could be one of the stakeholders like the ISM.
upvoted 2 times
AlexJacobson
10 months ago
Exactly how I think. The infosec manager can be the person who is to authorize it, but who should it be exactly should be defined in an escalation plan.
upvoted 1 times
...
...
oluchecpoint
1 year, 2 months ago
A. Escalation procedures. Escalation procedures typically outline the steps and criteria for involving external parties, such as third-party support providers, in the incident response process. These procedures help determine when it's necessary to seek external expertise or assistance in mitigating and resolving a security incident. This could include scenarios where the incident exceeds the organization's in-house capabilities or expertise. Therefore, escalation procedures are the primary means for authorizing such transfers.
upvoted 1 times
...
richck102
1 year, 5 months ago
C. chain of custody.
upvoted 1 times
[Removed]
1 year, 4 months ago
wrong. chain of custody is management of evidence
upvoted 1 times
...
...
dark_3k03r
1 year, 6 months ago
Selected Answer: A
The correct answer is (A) escalation procedures cause the steps are defined here by ISM and other stakeholders. Rationale: (B.) the information security manager is incorrect. Because escalation procedures are usually done alongside stakeholders and not just by the infosec manager. This is because the infosec manager may or may not be present. The infosec manager may or may not represent the interest of the business correctly. Even if he could do it well without eh business, if the manager leaves another manager may have a different process entirely. So this leads to inconsistency. Instead, the infosec manager alongside stakeholders should document it in an escalation procedure, and his predecessor/successor review and improve it. So it is instead preferred to have it in a documented process which is (A). (C.) chain of custody is how you enforce it, but not authorize it. Authorization is by the infosec manager by what has been defined in the escalation procedures. (D.) disaster recovery plan (DRP) relates to incidents and not necessarily security incidents.
upvoted 3 times
...
bambs
1 year, 7 months ago
Selected Answer: A
Escalation procedures describe the steps that should be taken to manage and resolve security incidents, including when and how to involve external parties such as third-party support providers. These procedures typically include criteria for escalating incidents, such as severity level or resource constraints, and define the roles and responsibilities of different stakeholders involved in the incident response process.
upvoted 4 times
...
CarlPTY07
1 year, 8 months ago
Selected Answer: B
Information security manager (supported by the steering securiy committe). So its B
upvoted 1 times
...
koala_lay
1 year, 8 months ago
Selected Answer: B
B. information Security Manager
upvoted 3 times
dark_3k03r
1 year, 6 months ago
ISM defines the criteria in the escalations procedures. This is primarily done because the ISM won't always be there to respond. Having it defined also enforces consistency and this is why they are documented in the first place. Thus why (A) is the correct answer.
upvoted 1 times
...
...
ccKane
1 year, 9 months ago
The information security manager is responsible for overseeing the security of the organization's information systems and data. In the event of an internal security incident, the information security manager has the authority to make decisions about the response to the incident, including the transfer of the incident handling to a third-party support provider. The information security manager considers factors such as the nature and severity of the incident, the resources and capabilities of the organization's internal security team, and the expertise and resources available from the third-party support provider when making a decision about transferring incident handling. While escalation procedures, chain of custody, and disaster recovery plan (DRP) may also play a role in the response to a security incident, the primary decision-making authority rests with the information security manager. These other elements provide guidelines and procedures for responding to incidents, but the information security manager is responsible for making the final decision about how the incident will be handled.
upvoted 4 times
koala_lay
1 year, 8 months ago
Thanks for detailed explanation
upvoted 1 times
...
Rowlandmarc
1 year, 8 months ago
I would argue the answer is A because the authorisation itself is DEFINED through the procedures... should the manager agree/consider the current factors is different
upvoted 2 times
...
...
Wladysk
1 year, 9 months ago
Selected Answer: C
Chain of custody forms that provide: name and contact information of custodians, when, why and by whom an evidence item was acquired or moved.
upvoted 1 times
dark_3k03r
1 year, 6 months ago
Chain of custody is how you enforce it, but that doesn't define when things are authorized. Only what to do once it is authorized.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...