ExamGecko
Question list
Search
Search

Question 214 - CISM discussion

Report
Export

Which of the following is the GREATEST value provided by a security information and event management (SIEM) system?

A.
Maintaining a repository base of security policies
Answers
A.
Maintaining a repository base of security policies
B.
Measuring impact of exploits on business processes
Answers
B.
Measuring impact of exploits on business processes
C.
Facilitating the monitoring of risk occurrences
Answers
C.
Facilitating the monitoring of risk occurrences
D.
Redirecting event logs to an alternate location for business continuity plan
Answers
D.
Redirecting event logs to an alternate location for business continuity plan
Suggested answer: C

Explanation:

A security information and event management (SIEM) system is a tool that collects, analyzes, and correlates security events from various sources, such as firewalls, intrusion detection systems, antivirus software, and other devices. A SIEM system can provide real-time alerts, dashboards, reports, and forensic analysis of security incidents. The greatest value of a SIEM system is that it can facilitate the monitoring of risk occurrences by identifying anomalies, trends, patterns, and indicators of compromise that may otherwise go unnoticed. A SIEM system can also help with incident response, compliance, and audit activities by providing evidence and documentation of security events.

Reference=

ISACA, CISM Review Manual, 16th Edition, 2020, page 2291

ISACA, CISM Review Questions, Answers & Explanations Database - 12 Month Subscription, 2020, question ID 2082

The greatest value provided by a Security Information and Event Management (SIEM) system is facilitating the monitoring of risk occurrences. SIEM systems collect, analyze and alert on security-related data from various sources such as firewall logs, intrusion detection/prevention systems, and system logs. This allows organizations to identify security threats in real-time and respond quickly, helping to mitigate potential harm to their systems and data.

asked 01/10/2024
MOHAMED BEN SLIMEN
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first