ExamGecko
Question list
Search
Search

Related questions











Question 379 - CISA discussion

Report
Export

An IS auditor follows up on a recent security incident and finds the incident response was not adequate. Which of the following findings should be considered MOST critical?

A.
The security weakness facilitating the attack was not identified.
Answers
A.
The security weakness facilitating the attack was not identified.
B.
The attack was not automatically blocked by the intrusion detection system (IDS).
Answers
B.
The attack was not automatically blocked by the intrusion detection system (IDS).
C.
The attack could not be traced back to the originating person.
Answers
C.
The attack could not be traced back to the originating person.
D.
Appropriate response documentation was not maintained.
Answers
D.
Appropriate response documentation was not maintained.
Suggested answer: A

Explanation:

The most critical finding for an IS auditor following up on a recent security incident is that the security weakness facilitating the attack was not identified. This finding indicates that the root cause of the incident was not analyzed, and the vulnerability that allowed the attack to succeed was not remediated. This means that the organization is still exposed to the same or similar attacks in the future, and its security posture has not improved. Identifying and addressing the security weakness is a key step in the incident response process, as it helps to prevent recurrence, mitigate impact, and improve resilience.

The other findings are not as critical as the failure to identify the security weakness, but they are still important issues that should be addressed by the organization. The attack was not automatically blocked by the intrusion detection system (IDS) is a finding that suggests that the IDS was not configured properly, or that it did not have the latest signatures or rules to detect and prevent the attack. The attack could not be traced back to the originating person is a finding that implies that the organization did not have sufficient logging, monitoring, or forensic capabilities to identify and attribute the attacker. Appropriate response documentation was not maintained is a finding that indicates that the organization did not follow a consistent and formal incident response procedure, or that it did not document its actions, decisions, and lessons learned from the incident.

ISACA CISA Review Manual 27th Edition (2019), page 254

Incident Response Process - ISACA1

Incident Response: How to Identify and Fix Security Weaknesses

asked 18/09/2024
martin lopez
23 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first