ExamGecko
Question list
Search
Search

Question 141 - CISM discussion

Report
Export

A cloud application used by an organization is found to have a serious vulnerability. After assessing the risk, which of the following would be the information security manager's BEST course of action?

A.
Instruct the vendor to conduct penetration testing.
Answers
A.
Instruct the vendor to conduct penetration testing.
B.
Suspend the connection to the application in the firewall
Answers
B.
Suspend the connection to the application in the firewall
C.
Report the situation to the business owner of the application.
Answers
C.
Report the situation to the business owner of the application.
D.
Initiate the organization's incident response process.
Answers
D.
Initiate the organization's incident response process.
Suggested answer: D

Explanation:

= Initiating the organization's incident response process is the best course of action for the information security manager when a cloud application used by the organization is found to have a serious vulnerability. The incident response process is a set of predefined steps and procedures that aim to contain, analyze, resolve, and learn from security incidents. The information security manager should follow the incident response process to ensure that the vulnerability is properly reported, assessed, mitigated, and communicated to the relevant stakeholders. The incident response process should also involve the cloud service provider (CSP) and the business owner of the application, as they are responsible for the security and functionality of the cloud application. Instructing the vendor to conduct penetration testing, suspending the connection to the application in the firewall, and reporting the situation to the business owner of the application are all possible actions that may be taken as part of the incident response process, but they are not the best initial course of action. Penetration testing may help to identify the root cause and the impact of the vulnerability, but it may also cause further damage or disruption to the cloud application. Suspending the connection to the application in the firewall may prevent unauthorized access or exploitation of the vulnerability, but it may also affect the availability and continuity of the cloud application. Reporting the situation to the business owner of the application is an important step to inform them of the risk and the potential business impact, but it is not sufficient to address the vulnerability and its consequences.Therefore, the information security manager should initiate the incident response process as the best course of action, and then perform the other actions as appropriate based on the incident response plan and the risk assessment.References= CISM Review Manual 2023, page 2111; CISM Practice Quiz2

asked 01/10/2024
Jonathan Hernández Hernández
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first