ExamGecko
Question list
Search
Search

Question 247 - CISM discussion

Report
Export

Which of the following should be considered FIRST when recovering a compromised system that needs a complete rebuild?

A.
Patch management files
Answers
A.
Patch management files
B.
Network system logs
Answers
B.
Network system logs
C.
Configuration management files
Answers
C.
Configuration management files
D.
Intrusion detection system (IDS) logs
Answers
D.
Intrusion detection system (IDS) logs
Suggested answer: A

Explanation:

Patch management files are the files that contain the patches or updates for the software applications and systems that are installed on the compromised system. Patch management files are essential to recover a compromised system that needs a complete rebuild, as they can help to restore the functionality, security, and performance of the system. Without patch management files, the system may not be able to run properly or securely, and may expose the organization to further risks or vulnerabilities. Network system logs, configuration management files, and intrusion detection system (IDS) logs are also important for recovering a compromised system, but they should be considered after patch management files.Network system logs can help to identify the source and scope of the attack, configuration management files can help to restore the original settings and policies of the system, and IDS logs can help to detect any malicious activities or anomalies on the system.Reference= CISM Review Manual, 16th Edition, pages 193-1941; CISM Review Questions, Answers & Explanations Manual, 10th Edition, page 672

asked 01/10/2024
Jordan Pfingsten
44 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first