ExamGecko
Question list
Search
Search

Question 482 - CISM discussion

Report
Export

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

A.
Report the risk associated with the policy breach.
Answers
A.
Report the risk associated with the policy breach.
B.
Enforce the security configuration and require the change to be reverted.
Answers
B.
Enforce the security configuration and require the change to be reverted.
C.
Implement compensating controls to address the risk.
Answers
C.
Implement compensating controls to address the risk.
D.
Implement a privileged access management system.
Answers
D.
Implement a privileged access management system.
Suggested answer: B

Explanation:

The first thing that an information security manager should do upon confirming a privileged user's unauthorized modifications to a security application is to enforce the security configuration and require the change to be reverted. This is because the unauthorized modification may have compromised the security of the application and the data it protects, and may have violated the security policies and standards of the organization. By enforcing the security configuration and requiring the change to be reverted, the information security manager can restore the security posture of the application and prevent further unauthorized modifications.

asked 01/10/2024
Tunde Ogunkoya
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first