Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 81 discussion

Actual exam question from ISC's CISSP
Question #: 81
Topic #: 1
[All CISSP Questions]

The security team is notified that a device on the network is infected with malware. Which of the following is MOST effective in enabling the device to be quickly located and remediated?

  • A. Data loss protection (DLP)
  • B. Intrusion detection
  • C. Vulnerability scanner
  • D. Information Technology Asset Management (ITAM)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
projtfer
Highly Voted 2 years, 1 month ago
Selected Answer: D
Selected D. The detection mechanism has already found out that a device has been infected which means it is too late for a vulnerability scanner. The tool that had detected the malware infection, would have given the hostname/IP address of that device. The question asks about the most effective way to "locate", if we plug in the hostname / IP address in the ITAM system, that would give the actual location (Geographical) location of that device and who to contact in case some boots on the ground is needed. Therefore ITAM is the right answer.
upvoted 15 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 3 times
...
...
kptest12
Highly Voted 2 years, 1 month ago
Selected Answer: D
In order to locate the asset we need a tool like ITAM
upvoted 5 times
...
somsom
Most Recent 1 month ago
Except if the ip address was flagged then ITAM can be used to find and remediate
upvoted 1 times
...
somsom
1 month ago
Let me tell yiu o'u a scenario that happened in my laptop. My laptop was infected by malware, I quickly use anti.virus to scan my system just to know the part infected. Immediately I was able to see it and remediate it. So IDS is correct. Snort is also an example of IDS
upvoted 1 times
...
Jenkins3mol
6 months, 3 weeks ago
What a terrible question. Asset System? No, you don't.
upvoted 1 times
...
Hardrvkllr
7 months, 1 week ago
ChatGPT and Copilot give two different answers, as I feel it is a B, Copilot states it is D, and ChatGPT states B
upvoted 1 times
...
Vasyamba1
8 months, 1 week ago
Selected Answer: C
IDS is correct because we don't know which exact host is infected to find it via ITAM, also ITAM is not mentioned in the OSG.
upvoted 1 times
...
Bach1968
1 year, 4 months ago
Selected Answer: D
Option D: Information Technology Asset Management (ITAM) can also play a role in enabling the infected device to be quickly located and remediated. ITAM involves tracking and managing the inventory of IT assets within an organization, including devices such as computers, servers, and network devices. By maintaining an up-to-date record of all devices, their locations, and configurations, ITAM can help identify the specific device that is infected with malware. Once the infected device is identified through ITAM, appropriate remediation actions can be taken, such as isolating the device, conducting a thorough scan for malware, applying patches or updates, or even physically removing and replacing the device if necessary. Therefore, both option B (Intrusion detection) and option D (ITAM) can be effective in quickly locating and remedying an infected device. The choice between them may depend on the specific capabilities and implementation of the organization's security infrastructure.
upvoted 1 times
...
KCLung
1 year, 5 months ago
I do not understand why it is D. I do not hear any IT inventory system can detect the malware and fix it. Although it can easy to detect location of the device, how can it detect which device has the malware. It sounds does not make sense. I would choose C as the IDS can detect the attack of malware and display the source IP of the attack.
upvoted 3 times
...
Jamati
2 years ago
Selected Answer: D
Answer is D. The rest don't make sense.
upvoted 3 times
...
Vino22
2 years, 1 month ago
C is the answer
upvoted 2 times
franbarpro
2 years, 1 month ago
How scanning for weaknesses will help you locate and remediate the malware? The answer should Def be "D". If you have an up to date Inventory is should be easy to find the device and fix the issue.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...