ExamGecko
Question list
Search
Search

Question 468 - CISM discussion

Report
Export

Which of the following should be established FIRST when implementing an information security governance framework?

A.
Security architecture
Answers
A.
Security architecture
B.
Security policies
Answers
B.
Security policies
C.
Security incident management team
Answers
C.
Security incident management team
D.
Security awareness training program
Answers
D.
Security awareness training program
Suggested answer: A

Explanation:

This is the most urgent and effective action to prevent further damage or compromise of the organization's network and data. The other options are less important or irrelevant in this situation.

According toHow to identify suspicious insider activity using Active Directory, one of the steps to detect and respond to suspicious activity is to isolate the affected device from the network.This can be done by disabling the network adapter, unplugging the network cable, or blocking the device's IP address on the firewall1. This will prevent the device from communicating with any malicious actors or spreading malware to other devices on the network.

`

asked 01/10/2024
Storage Junk
48 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first