Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 203 discussion

Actual exam question from ISC's CISSP
Question #: 203
Topic #: 1
[All CISSP Questions]

Which of the following MUST the administrator of a security information and event management (SIEM) system ensure?

  • A. All sources are synchronized with a common time reference.
  • B. All sources are reporting in the exact same Extensible Markup Language (XML) format.
  • C. Data sources do not contain information infringing upon privacy regulations.
  • D. Each source uses the same Internet Protocol (IP) address for reporting.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
CCNPWILL
5 months, 4 weeks ago
A is correct. Without NTP/timestamps, doesnt matter which log format the data arrives in. we MUST have the timestamps to correlate data.
upvoted 2 times
...
homeysl
1 year, 1 month ago
Selected Answer: A
SIEM needs that for correlation
upvoted 2 times
...
ccKane
1 year, 1 month ago
Selected Answer: A
C is not a MUST do for an SIEM Administrator. I go with A.
upvoted 1 times
...
MShaaban
1 year, 3 months ago
It is clearly A.
upvoted 2 times
...
DeepCyber
1 year, 5 months ago
Selected Answer: C
Time synchronization is important but it is asking about most Important. We need to ensure data sources does not contain information infringing upon privacy regulations. We need to either mask, anonymize or remove privacy data before sending to SIEM. This should be most important task.
upvoted 3 times
...
dmo_d
1 year, 6 months ago
Selected Answer: C
Time synchronisation is obviously the most important thing. But how can the SIEM administrator influence the time of each reporting system?? Even if the SIEM admin tries to insert some correction in the received timestamps, the source systems time could deviate more and more over time. IMHO there is no way for the receiver to ensure a synchronous time.
upvoted 1 times
...
Ernestokoro
1 year, 8 months ago
CISSP OFFICIAL GUIDE 9TH EDITION. PG829:Logging systems should also make use of the Network Time Protocol (NTP) to ensure that clocks are synchronized on systems sending log entries to the SIEM as well as the SIEM itself. This ensures that information from multiple sources has a consistent timeline. Information security managers should also periodically conduct log reviews, particularly for sensitive functions, to ensure that privileged users are not abusing their privileges. For example, if an information security team has access to eDiscovery tools that allow searching through the contents of individual user files, security managers should routinely review the logs of actions taken by those administrative users to ensure that their file access relates to legitimate eDiscovery initiatives and does not violate user privacy
upvoted 2 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
conur87
1 year, 10 months ago
Selected Answer: C
Privacy regulations compliance is a must for SIEM administrator to ensure that the data sources do not contain information infringing upon privacy regulations.
upvoted 1 times
...
DJOEK
1 year, 10 months ago
Selected Answer: A
It is important that all sources are synchronized with a common time reference because it ensures that the events being logged and analyzed are correctly correlated and accurately reflect the order in which they occurred. This is important for properly identifying and investigating security incidents, as well as for creating reports and performing analytics on the data. If the sources are not synchronized, the data may be misleading or confusing, which can hinder the effectiveness of the SIEM system.
upvoted 2 times
...
Ivanchun
1 year, 11 months ago
Selected Answer: A
Time sync is most important
upvoted 1 times
...
rdy4u
2 years ago
Selected Answer: A
Time is one of the most important things when it comes to the analysis of log information collected from security devices. https://resources.infosecinstitute.com/certification/security-technologies-and-tools-siem/
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...