ExamGecko
Question list
Search
Search

Related questions











Question 304 - CISA discussion

Report
Export

A now regulation requires organizations to report significant security incidents to the regulator within 24 hours of identification. Which of the following is the IS auditor's BEST recommendation to facilitate compliance with the regulation?

A.
Establish key performance indicators (KPls) for timely identification of security incidents.
Answers
A.
Establish key performance indicators (KPls) for timely identification of security incidents.
B.
Engage an external security incident response expert for incident handling.
Answers
B.
Engage an external security incident response expert for incident handling.
C.
Enhance the alert functionality of the intrusion detection system (IDS).
Answers
C.
Enhance the alert functionality of the intrusion detection system (IDS).
D.
Include the requirement in the incident management response plan.
Answers
D.
Include the requirement in the incident management response plan.
Suggested answer: D

Explanation:

The best recommendation for the IS auditor to facilitate compliance with the new regulation is to include the requirement in the incident management response plan. An incident management response plan is a document that defines the roles, responsibilities, processes, and procedures for responding to security incidents. By including the new regulation in the plan, the IS auditor can ensure that the organization is aware of the reporting obligation, has a clear workflow for notifying the regulator within 24 hours, and has the necessary documentation and evidence to support the report.

The other options are not as effective as including the requirement in the incident management response plan:

Establishing key performance indicators (KPIs) for timely identification of security incidents is a good practice, but it does not guarantee compliance with the regulation. KPIs are metrics that measure the performance of a process or activity, but they do not specify how to perform it. The IS auditor should also provide guidance on how to identify and report security incidents within 24 hours.

Engaging an external security incident response expert for incident handling is a possible option, but it may not be feasible or cost-effective. The organization may not have the budget or time to hire an external expert, or may prefer to handle the incidents internally. The IS auditor should also evaluate the qualifications and trustworthiness of the external expert, and ensure that they comply with the regulation and other contractual or legal obligations.

Enhancing the alert functionality of the intrusion detection system (IDS) is a useful measure, but it is not sufficient to comply with the regulation. An IDS is a tool that monitors network traffic for malicious activity and alerts the network administrator or takes preventive action. However, an IDS may not detect all types of security incidents, or may generate false positives or negatives. The IS auditor should also consider other sources of incident detection, such as logs, reports, audits, or user feedback.

asked 18/09/2024
Juan Yontz
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first