Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 50 discussion

Actual exam question from ISC's CISSP
Question #: 50
Topic #: 1
[All CISSP Questions]

In a quarterly system access review, an active privileged account was discovered that did not exist in the prior review on the production system. The account was created one hour after the previous access review. Which of the following is the BEST option to reduce overall risk in addition to quarterly access reviews?

  • A. Implement bi-annual reviews.
  • B. Create policies for system access.
  • C. Implement and review risk-based alerts.
  • D. Increase logging levels.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
N00b1e
Highly Voted 2 years, 2 months ago
Selected Answer: B
I agree with B. If you create a policy on when system accounts can be created, they would have to be logged or someone would have to actively break policy. Think like a manager!
upvoted 17 times
1460168
3 months, 4 weeks ago
Think like a Manager. Do not touch anything, tell others how to do it.
upvoted 1 times
...
Jamati
2 years ago
I agree, the key here is to think like a manager.
upvoted 2 times
...
jackdryan
1 year, 7 months ago
B is correct
upvoted 1 times
...
...
thomass
Highly Voted 2 years, 2 months ago
sorry, should be C?
upvoted 10 times
Ramye
6 months, 1 week ago
Why though? Without the established policy, there won’t be any concern of creating accts, hence there should not be any trigger or anything like that. So answer most likely B. But if anyone has confirmed answer I’ll be happy to take that. Thx
upvoted 1 times
...
...
GabrielVillamizar
Most Recent 3 months, 3 weeks ago
Selected Answer: C
En base a la pregunta, al C es la correcta
upvoted 1 times
...
Nithstar
4 months ago
answer c is correct sinc alerts can detect changes
upvoted 1 times
...
CCNPWILL
5 months, 3 weeks ago
Selected Answer: C
B is a good answer, but C is better.
upvoted 1 times
...
Jenkins3mol
6 months, 4 weeks ago
Selected Answer: C
Well, this is quite contentious a question, huh. But as you can see, you will have to change the policy along the way, anyway, every time after you have done a quarterly check. So B would be out of the question very necessary, fundamental and routine; however, C is directly resolving the problem depicted in the question body, so C is more relevant an answer which is heavily implied by the question composer. And C is the conclusion that you should have as a manager after adopting doubleloop thinking method.
upvoted 4 times
...
jieaws
7 months, 2 weeks ago
B policies encompasses C alert implementation. B enforces C and holds the stake holders (usually Sr professionals) accountable for implementation alignment with the police B. I finally understand why CISSP exam emphasizes managerial view. B takes precedence C. In order words, B must be in place first. I choose B.
upvoted 1 times
...
AshStevens
7 months, 3 weeks ago
Selected Answer: C
C. The trick here is that it was created immediately after the previous check. The implication is that the user is very aware that it wouldn't be allowed UNDER THE POLICIES THEY ALREADY HAVE, and are choosing to ignore that. A new policy does not enforce compliance, but setting up alerts to monitor would immediately detect non-compliance regardless of the users intent or timing.
upvoted 1 times
...
Vaneck
8 months, 1 week ago
Selected Answer: C
The best option for reducing overall risk in addition to quarterly access reviews is : C. Implement and review risk-based alerts. Implementing and reviewing risk-based alerts would enable early detection of suspicious or unauthorized activity, such as the creation of new privileged accounts, and react accordingly. This proactive approach helps to identify and mitigate potential risks in real time, rather than relying solely on periodic reviews.
upvoted 1 times
...
john_boogieman
8 months, 1 week ago
Selected Answer: C
In the context of the scenario provided, implementing and reviewing risk-based alerts be the better option for immediate risk mitigation.
upvoted 1 times
...
homeysl
8 months, 2 weeks ago
Selected Answer: B
Policy vs. Alert
upvoted 1 times
...
lexvather
9 months ago
C. the key is here was created 1 hour after of previous review, so they will detect the account until the next review will be performed. The best option is C. Answer B should be a good option but not accomplish the detection and response.
upvoted 1 times
...
xxxBadManxxx
9 months, 1 week ago
Selected Answer: D
D. Implement and review risk-based alerts. Explanation: Implementing and reviewing risk-based alerts will help detect and respond to unusual or potentially risky activities in real-time. In this specific case, the creation of an active privileged account that did not exist in the prior review raises concerns about potential unauthorized or suspicious activities. By implementing risk-based alerts, you can set up automated monitoring systems that notify you when certain high-risk events occur, allowing for immediate investigation and action. The discovery of an active privileged account that was created shortly after the previous access review highlights the need for more frequent monitoring and alerting. Implementing risk-based alerts can help identify and respond to potential security issues in real-time, rather than waiting for the next quarterly review. This can help reduce the overall risk of unauthorized access or malicious activity.
upvoted 1 times
...
bdlm
10 months, 2 weeks ago
Selected Answer: C
I'm going with C because there are policies in place regarding access control (the quarterly audit). Implementing C could be an augmentation to the existing policy that specifically addresses the issue. For being more specific and directly addressing the issue, I'm going with C.
upvoted 3 times
...
InclusiveSTEAM
1 year, 1 month ago
C is the answer The best option to reduce risk in this situation in addition to quarterly access reviews is C - Implement and review risk-based alerts. Configuring alerts to detect unauthorized privileged account creation in close proximity to access reviews would directly detect this suspicious activity. Regularly reviewing alerts improves visibility. Option A may be useful but does not address real-time detection. Option B helps set policy but does not provide technical enforcement. Option D gives more data but alerts actively surface high-risk events. In summary, implementing risk-based alerts that trigger on anomalies like this, along with prompt review, would provide the fastest mitigation and risk reduction.
upvoted 2 times
...
Sledge_Hammer
1 year, 2 months ago
The correct answer is C. An organization that already review their system access quarterly, obviously has a System Access policy in place so no need in creating policies for system access.
upvoted 1 times
...
georgegeorge125487
1 year, 3 months ago
Selected Answer: C
Between quarterly review you have to implement a detective control i.e. an alert. A policy will not solve the imediate issue with a new privileged account created in between.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...