ExamGecko
Question list
Search
Search

Question 146 - CISM discussion

Report
Export

Which of the following MUST happen immediately following the identification of a malware incident?

A.
Preparation
Answers
A.
Preparation
B.
Recovery
Answers
B.
Recovery
C.
Containment
Answers
C.
Containment
D.
Eradication
Answers
D.
Eradication
Suggested answer: C

Explanation:

Containment is the action that MUST happen immediately following the identification of a malware incident because it aims to isolate the affected systems or networks from the rest of the environment and prevent the spread or escalation of the malware. Containment can involve disconnecting the systems or networks from the internet, blocking or filtering certain ports or protocols, or creating separate VLANs or subnets for the isolated systems or networks.Containment is part of the incident response process and should be performed as soon as possible after detecting a malware incident12. Preparation (A) is the phase that happens before the identification of a malware incident, where the organization establishes the incident response plan, team, roles, resources, and tools.Preparation is essential for ensuring the readiness and capability of the organization to respond to malware incidents effectively and efficiently12. Recovery (B) is the phase that happens after the containment and eradication of a malware incident, where the organization restores the normal operations of the systems or networks, verifies the functionality and security of the systems or networks, and implements the preventive and corrective measures to avoid or mitigate future malware incidents.Recovery is the final phase of the incident response process and should be performed after ensuring that the malware incident is fully resolved and the systems or networks are clean and secure12. Eradication (D) is the phase that happens after the containment of a malware incident, where the organization removes the malware and its traces from the systems or networks, identifies the root cause and impact of the malware incident, and collects and preserves the evidence for analysis and investigation.Eradication is an important phase of the incident response process, but it does not happen immediately after the identification of a malware incident12.Reference=1: CISM Review Manual 15th Edition, page 308-3091;2: Cybersecurity Incident Response Exercise Guidance - ISACA2

asked 01/10/2024
haythem BRIGUI
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first