ExamGecko
Question list
Search
Search

Question 511 - CISM discussion

Report
Export

Following a breach where the risk has been isolated and forensic processes have been performed, which of the following should be done NEXT?

A.
Place the web server in quarantine.
Answers
A.
Place the web server in quarantine.
B.
Rebuild the server from the last verified backup.
Answers
B.
Rebuild the server from the last verified backup.
C.
Shut down the server in an organized manner.
Answers
C.
Shut down the server in an organized manner.
D.
Rebuild the server with relevant patches from the original media.
Answers
D.
Rebuild the server with relevant patches from the original media.
Suggested answer: B

Explanation:

= After a breach where the risk has been isolated and forensic processes have been performed, the next step should be to rebuild the server from the last verified backup. This will ensure that the server is restored to a known and secure state, and that any malicious code or data that may have been injected or compromised by the attacker is removed. Rebuilding the server from the original media may not be sufficient, as it may not include the latest patches or configurations that were applied before the breach. Placing the web server in quarantine or shutting it down may not be feasible or desirable, as it may disrupt the business operations or services that depend on the server. Rebuilding the server from the last verified backup is the best option to resume normal operations while maintaining security.Reference=

CISM Review Manual 15th Edition, page 118: ''Recovery is the process of restoring normal operations after an incident. Recovery activities may include rebuilding systems, restoring data, applying patches, changing passwords, and testing functionality.''

Data Breach Experts Share The Most Important Next Step You Should Take After A Data Breach in 2014 & 2015, snippet: ''Restore from backup. If you have a backup of your system from before the breach, wipe your system clean and restore from backup. This will ensure that any backdoors or malware installed by the hackers are removed.''

asked 01/10/2024
Franklin Leon
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first