ExamGecko
Question list
Search
Search

Question 110 - CISM discussion

Report
Export

A security incident has been reported within an organization. When should an inforrnation security manager contact the information owner? After the:

A.
incident has been confirmed.
Answers
A.
incident has been confirmed.
B.
incident has been contained.
Answers
B.
incident has been contained.
C.
potential incident has been logged.
Answers
C.
potential incident has been logged.
D.
incident has been mitigated.
Answers
D.
incident has been mitigated.
Suggested answer: A

Explanation:

= The information security manager should contact the information owner after the incident has been confirmed, as this is the first step of the incident response process. The information owner is the person who has the authority and responsibility for the information asset that is affected by the incident. The information owner needs to be informed of the incident as soon as possible, as they may have to make decisions or take actions regarding the protection, recovery, or restoration of the information asset. The information owner may also have to communicate with other stakeholders, such as the business units, customers, regulators, or media, depending on the nature and impact of the incident.

The other options are not the correct time to contact the information owner, as they occur later in the incident response process. Contacting the information owner after the incident has been contained, mitigated, or logged may delay the notification and escalation of the incident, as well as the involvement and collaboration of the information owner. Moreover, contacting the information owner after the incident has been contained or mitigated may imply that the incident response team has already taken actions that may affect the information asset without the consent or approval of the information owner. Contacting the information owner after a potential incident has been logged may cause unnecessary alarm or confusion, as the potential incident may not be a real or significant incident, or it may not affect the information owner's asset.Reference=

CISM Review Manual, 16th Edition, ISACA, 2022, pp. 219-220, 226-227.

CISM Questions, Answers & Explanations Database, ISACA, 2022, QID 1009.

asked 01/10/2024
Sukhpreet Sidhu
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first