ExamGecko
Question list
Search
Search

Question 681 - CISM discussion

Report
Export

Which of the following should an information security manager do FIRST upon confirming a privileged user's unauthorized modifications to a security application?

A.
Implement compensating controls to address the risk.
Answers
A.
Implement compensating controls to address the risk.
B.
Report the risk associated with the policy breach.
Answers
B.
Report the risk associated with the policy breach.
C.
Implement a privileged access management system.
Answers
C.
Implement a privileged access management system.
D.
Enforce the security configuration and require the change to be reverted.
Answers
D.
Enforce the security configuration and require the change to be reverted.
Suggested answer: D

Explanation:

The first step in handling unauthorized modifications to a security application is to assess the problems and institute rollback procedures, if needed. This will ensure that the security application is restored to its original state and prevent further damage or exploitation. The other options are possible actions to take after the rollback, but they are not the first priority.

Reference=Protect, Detect and Correct Methodology to Mitigate Incidents: Insider Threats(section: The Insider Threat)

asked 01/10/2024
Jailson Batista
35 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first