ExamGecko
Question list
Search
Search

Related questions

Question 186 - CISA discussion

Report
Export

Following a security breach in which a hacker exploited a well-known vulnerability in the domain controller, an IS audit has been asked to conduct a control assessment. the auditor's BEST course of action would be to determine if:

A.
the patches were updated.
Answers
A.
the patches were updated.
B.
The logs were monitored.
Answers
B.
The logs were monitored.
C.
The network traffic was being monitored.
Answers
C.
The network traffic was being monitored.
D.
The domain controller was classified for high availability.
Answers
D.
The domain controller was classified for high availability.
Suggested answer: B

Explanation:

The auditor's best course of action after a security breach in which a hacker exploited a well-known vulnerability in the domain controller is to determine if the logs were monitored. Log monitoring is an essential control for detecting and responding to security incidents, especially when known vulnerabilities exist in the system. The auditor should assess if the logs were properly configured, collected, reviewed, analyzed, and acted upon by the responsible parties. Updating patches, monitoring network traffic, and classifying domain controllers for high availability are also important controls, but they are not directly related to the detection and response of the security breach.Reference:

CISA Review Manual (Digital Version), page 301

CISA Questions, Answers & Explanations Database, question ID 3340

asked 18/09/2024
Feroz Khan
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first