An information security team has confirmed that threat actors are taking advantage of a newly announced critical vulnerability within an application. Which of the following should be done FIRST?
When a critical vulnerability is discovered that is being actively exploited by threat actors, the first and most important step is to invoke the organization's incident response plan. This plan provides a structured and well-defined process for responding to security incidents, ensuring that the appropriate actions are taken in a timely and coordinated manner.
This section is not available anymore. Please use the main Exam Page.CISM Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
koala_lay
10 months, 3 weeks agosausageman
11 months ago1899f17
1 year, 1 month ago