D - because option C it doesn’t directly contain the incident. Automated detection helps in early identification, but it doesn’t stop the spread or limit the impact of an incident once it has occurred.
One of the first actions for a compromised IaaS element (e.g web server) is to isolate it from the production network and then engage on further containment / eradication activities.
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Booict
11Â months, 1Â week agoSHERLOCKAWS
1Â year, 6Â months agoSoleandheel
1Â year, 7Â months agoCyberbug2021
1Â year, 7Â months agoAlexJacobson
1Â year, 5Â months agoPOWNED
1Â year, 5Â months agorichck102
1Â year, 9Â months ago