exam questions

Exam CRISC All Questions

View all questions & answers for the CRISC exam

Exam CRISC topic 1 question 649 discussion

Actual exam question from Isaca's CRISC
Question #: 649
Topic #: 1
[All CRISC Questions]

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

  • A. Developing threats are detected earlier.
  • B. Forensic investigations are facilitated.
  • C. Security violations can be identified.
  • D. A record of incidents is maintained.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
hussmohsin
Highly Voted 3 years, 5 months ago
Collecting logs from different systems will have benefit of keeping a record of incidents. However, ANALYZING the logs will help identify the security variolations so the answer is C.
upvoted 10 times
...
01010100
Most Recent 10 months ago
Selected Answer: A
A. Developing threats are detected earlier. Analyzing logs collected from different systems allows for the correlation of events and behaviors that might not be apparent when looking at logs from a single system in isolation. This integrated view can often lead to the earlier detection of developing threats, providing an opportunity to mitigate risks before they become critical incidents. While options B, C, and D are valid benefits of log analysis, the greatest benefit in a proactive sense is the early detection of developing threats (Option A), as it enables timely response to minimize potential damage.
upvoted 1 times
...
Staanlee
10 months, 3 weeks ago
Selected Answer: C
C. Security violations can be identified. Analyzing logs collected from different systems is primarily aimed at identifying security violations and anomalies in the behavior of these systems. It helps in detecting unauthorized access, unusual patterns of activity, and potential security breaches. While logs also support forensic investigations and maintaining a record of incidents, the primary benefit is the real-time or near-real-time identification of security violations, which can enable organizations to respond quickly to mitigate potential threats and minimize damage.
upvoted 1 times
...
jennarink13
1 year, 1 month ago
A is proactive, C is reactive. I think A is better
upvoted 2 times
...
CbtL
1 year, 3 months ago
Selected Answer: C
Agree with C.
upvoted 1 times
...
Julianleehk
1 year, 5 months ago
should be C
upvoted 2 times
...
john_boogieman
1 year, 5 months ago
Selected Answer: C
A developing threat may or may not be detected sooner, but what is certain is that a breach can be detected.
upvoted 2 times
...
Boubou480
1 year, 5 months ago
Selected Answer: A
Answer D the earlier detection of threats has the potential to prevent incidents from occurring in the first place, which is a greater benefit.
upvoted 1 times
...
Raj1510
2 years, 6 months ago
I thing answer should be A , since question mention from different systems which means pointing to correlation of events, agree that one good use is identifying violations but better use of identifying new or developing threats.
upvoted 3 times
...
Raj1510
2 years, 6 months ago
agree with C
upvoted 2 times
...
MusMus
2 years, 7 months ago
Selected Answer: C
should be C
upvoted 3 times
...
Tsuresh
3 years, 5 months ago
Analysis of log data can identify security violations and be instrumental in forensics investigations.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...