exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 407 discussion

Actual exam question from ISC's CISSP
Question #: 407
Topic #: 1
[All CISSP Questions]

Which type of log collection is focused on detecting and responding to attacks, malware infection, and data theft?

  • A. Intrusion detection
  • B. Operational
  • C. Security
  • D. Compliance
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
BigITGuy
4 days, 12 hours ago
Selected Answer: C
Intrusion detection is a specific detection mechanism, not a log type.
upvoted 1 times
...
1460168
8 months ago
Selected Answer: C
Because of Chris's answer, I vote for C.
upvoted 1 times
...
Chris
9 months ago
Selected Answer: C
The CISSP Official Study Guide states that security logs are specifically used to record access to resources and can help detect malicious activities such as unauthorized access and data theft. These logs are essential for identifying and responding to security incidents​​. Therefore, the correct answer is: C. Security This information is found on pages 835-836 of the study guide​
upvoted 4 times
...
safri
10 months ago
Selected Answer: C
I would go with D because of data theft. The threat can already be inside your network and would not be detected in intrusion detection. Also security is broader
upvoted 1 times
...
CCNPWILL
10 months, 1 week ago
Selected Answer: A
Language keywords suggest answer is A and not C. but sure C can, it is a broad answer. answer broadly or answer what is asked? I will go with A.
upvoted 1 times
Zapepelele
3 months, 2 weeks ago
..."focused on detecting and RESPONDING"... it cannot be option-A, so D is the answer.
upvoted 1 times
...
...
hoho2000
1 year ago
Selected Answer: D
Should be D. IDS dont response to attack short of issuing an alert or email. In this context I would say the question is asking for stopping the attack since they added in malwares etc words
upvoted 1 times
...
GeenHersens
1 year, 1 month ago
Selected Answer: A
Answer C is too broad. The question contains "focused" and IDS detects and responds to "attacks, malware infection, and data theft".
upvoted 1 times
...
pete79
1 year, 1 month ago
Selected Answer: C
C contains A
upvoted 2 times
...
GuardianAngel
1 year, 1 month ago
SOAR collects security logs and can respond and "security logs" can include system, security, router, firewall, EDR and other logs. I would say C. Security logs is correct. ID can be either just detection or it can be detection and response, but it doesn't cover malware infection, and data theft as well as a SOAR can.
upvoted 1 times
...
gjimenezf
1 year, 2 months ago
Selected Answer: A
IDS is the best, Security is limited
upvoted 1 times
...
GPrep
1 year, 3 months ago
Selected Answer: A
I'm going with A. Security logs are just that, logs, they won't react in any way. While IPS is a better solution on the network, IDS CAN respond - see pg 414 of the CISSP Study guide - "Until your browser and/or host-based intrusion detection system (HIDS) can detect and respond to push lockers, the only response is to close/terminate the browser and not return to the same URL. Host-based CAN respond in some way.
upvoted 3 times
...
YesPlease
1 year, 3 months ago
Selected Answer: A
Answer A) IDS Keywords in question, "detecting and responding". Only IDS can do this from the list provided.
upvoted 1 times
...
babaseun
1 year, 11 months ago
Selected Answer: C
How will Intrusion detection detect data theft?
upvoted 2 times
jackdryan
1 year, 10 months ago
C is correct
upvoted 1 times
...
...
[Removed]
2 years ago
Selected Answer: C
I would go for C here. I think IDS logs are too narrow of a concept for data theft and malware. Security seems a broader concept that covers it all.
upvoted 1 times
...
Goseu
2 years ago
Selected Answer: C
The type of log collection that is focused on detecting and responding to attacks, malware infection, and data theft is Security log collection. ChatGPT
upvoted 1 times
...
Delab202
2 years ago
Selected Answer: C
Security log collection is focused on detecting and responding to attacks, malware infection, and data theft. Security log collection involves the monitoring and analysis of various system and application logs to identify security-related events, such as failed login attempts, changes to system configurations, and network activity. This type of log collection is critical for identifying and responding to security incidents, such as cyber attacks, malware infections, and data theft.
upvoted 1 times
...
sausageman
2 years ago
Selected Answer: A
Definitely A. https://resources.infosecinstitute.com/certification/logging-monitoring-need-know-cissp/#:~:text=An%20overview%20of%20log%20file&text=Some%20popular%20examples%20of%20log,prevention%20system%20(IPS)%20logs.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago