ExamGecko
Question list
Search
Search

Question 218 - CISM discussion

Report
Export

An information security manager has been notified about a compromised endpoint device Which of the following is the BEST course of action to prevent further damage?

A.
Wipe and reset the endpoint device.
Answers
A.
Wipe and reset the endpoint device.
B.
Isolate the endpoint device.
Answers
B.
Isolate the endpoint device.
C.
Power off the endpoint device.
Answers
C.
Power off the endpoint device.
D.
Run a virus scan on the endpoint device.
Answers
D.
Run a virus scan on the endpoint device.
Suggested answer: B

Explanation:

A compromised endpoint device is a potential threat to the security of the network and the data stored on it. The best course of action to prevent further damage is to isolate the endpoint device from the network and other devices, so that the attacker cannot access or spread to other systems. Isolating the endpoint device also allows the information security manager to investigate the incident and determine the root cause, the extent of the compromise, and the appropriate remediation steps. Wiping and resetting the endpoint device may not be feasible or desirable, as it may result in data loss or evidence destruction. Powering off the endpoint device may not stop the attack, as the attacker may have installed persistent malware or backdoors that can resume once the device is powered on again.Running a virus scan on the endpoint device may not be effective, as the attacker may have used sophisticated techniques to evade detection or disable the antivirus software.Reference= CISM Review Manual, 15th Edition, page 1741; CISM Review Questions, Answers & Explanations Database, question ID 2112; Using EDR to Address Unmanaged Devices - ISACA3; Boosting Cyberresilience for Critical Enterprise IT Systems With COBIT and NIST Cybersecurity Frameworks - ISACA; Endpoint Security: On the Frontline of Cyber Risk.

The best way to reduce the risk associated with a bring your own device (BYOD) program is to implement a mobile device policy and standard. This policy should include guidelines and rules regarding the use of mobile devices, such as acceptable use guidelines and restrictions on the types of data that can be stored or accessed on the device. Additionally, it should also include requirements for secure mobile device practices, such as the use of strong passwords, encryption, and regular patching. A mobile device management (MDM) solution can also be implemented to help ensure mobile devices meet the organizational security requirements. However, it is not enough to simply implement the policy and MDM solution; employees must also be trained on the secure mobile device practices to ensure the policy is followed.

asked 01/10/2024
Earl Frederick
32 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first