ExamGecko
Question list
Search
Search

Question 17 - CISM discussion

Report
Export

During which of the following phases should an incident response team document actions required to remove the threat that caused the incident?

A.
Post-incident review
Answers
A.
Post-incident review
B.
Eradication
Answers
B.
Eradication
C.
Containment
Answers
C.
Containment
D.
Identification
Answers
D.
Identification
Suggested answer: B

Explanation:

The eradication phase of incident response is the stage where the incident response team documents and performs the actions required to remove the threat that caused the incident1.This phase involves identifying and eliminating the root cause of the incident, such as malware, compromised accounts, unauthorized access, or misconfigured systems2.The eradication phase also involves restoring the affected systems to a secure state, deleting any malicious files or artifacts, and verifying that the threat has been completely removed2.The eradication phase is the first step in returning a compromised environment to its proper state2. The other phases of incident response are:

Preparation: The phase where the incident response team prepares for potential incidents by defining roles, responsibilities, procedures, tools, and resources1.

Detection and analysis: The phase where the incident response team identifies and prioritizes the incidents based on their severity, impact, and urgency1.

Containment: The phase where the incident response team isolates the affected systems or networks to prevent the spread of the incident and minimize the damage1.

Recovery: The phase where the incident response team restores the normal operations of the systems or networks, and implements any necessary changes or improvements to prevent recurrence1.

Post-incident review: The phase where the incident response team evaluates the effectiveness of the incident response process, identifies the lessons learned, and provides recommendations for improvement1.Reference=3: Critical Incident Stress Management: CISM Implementation Guidelines2: What is the Eradication Phase of Incident Response?- RSI Security1: Incident Response Models - ISACA

asked 01/10/2024
paloma giraudo
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first