exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 69 discussion

Actual exam question from Isaca's CISM
Question #: 69
Topic #: 1
[All CISM Questions]

For an organization that provides web-based services, which of the following security events would MOST likely initiate an incident response plan and be escalated to management?

  • A. Anti-malware alerts on several employees' workstations
  • B. Several port scans of the web server
  • C. Multiple failed login attempts on an employee's workstation
  • D. Suspicious network traffic originating from the demilitarized zone (DMZ)
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Boats
Highly Voted 2 years, 1 month ago
Selected Answer: D
A would depend on the severity of the Anti-malware but does not relate to web-based services. Ports scans happen all of the time. Simeone in my DMZ where I house my web services would be the most concerning to me.
upvoted 10 times
[Removed]
1 year, 5 months ago
yeah but you wouldn escalate a suspicious traffic, without confirming it first if it's a false positive. you would escalate many computers getting malware alerts
upvoted 5 times
...
...
Broesweelies
Highly Voted 1 year, 11 months ago
Selected Answer: D
D. Suspicious network traffic originating from the demilitarized zone (DMZ) would MOST likely initiate an incident response plan and be escalated to management. The DMZ is a network segment that is typically used to host public-facing servers, such as web servers, and it is considered a high-risk area. Suspicious network traffic originating from the DMZ could indicate that an attacker has breached the perimeter and is attempting to move laterally through the network, or it could be a sign of a compromise of one of the organization's web-based services. This type of event would be considered a high-priority incident and would require a rapid response and escalation to management.
upvoted 8 times
...
Marcelus1714
Most Recent 9 months, 2 weeks ago
Selected Answer: D
I'm manager and I would report the D to the management.. If everytime I have some alerts (just alerts, not verified) from anti-malware systems I have to report my management... I would be fired xD
upvoted 1 times
...
oluchecpoint
10 months, 2 weeks ago
Selected Answer: D
Suspicious network traffic from the DMZ is a more serious and potentially indicative of a security breach or intrusion attempt. The DMZ is a critical part of the network that sits between the external (untrusted) network and the internal (trusted) network. Any suspicious activity from this zone should be treated with utmost seriousness as it may signify a direct attempt to breach the organization's perimeter defenses or compromise the web-based services.
upvoted 2 times
...
f6acde0
1 year ago
Selected Answer: D
Malware on the outside could mean anything. D is the way to go.
upvoted 1 times
...
Viperhunter
1 year ago
Selected Answer: D
In the context of an organization providing web-based services, suspicious network traffic originating from the demilitarized zone (DMZ) would be most likely to initiate an incident response plan and be escalated to management. The DMZ is a critical security zone that separates the internal network from the external network, and unusual or suspicious traffic in this area could indicate a potential security incident that requires investigation and response.
upvoted 1 times
...
Viperhunter
1 year ago
Selected Answer: D
In the context of a web-based service provider, suspicious network traffic from the demilitarized zone (DMZ) could indicate a potential security incident. The DMZ is a critical boundary zone that separates the internal network from the external internet-facing services. Any unusual or suspicious network activity originating from the DMZ, especially if it suggests unauthorized access or compromise, would typically warrant immediate attention and activation of the incident response plan. This type of event is often considered more critical and impactful than the other options listed. While the other events (anti-malware alerts, port scans, failed login attempts) may be noteworthy and could trigger certain security measures, suspicious network traffic from the DMZ is more likely to be viewed as a potential serious threat to the organization's web-based services.
upvoted 1 times
...
Perseus_68
1 year, 2 months ago
They are trying to mislead you with web-based services. That doesn't mean that the company doesn't have their own IT infrastructure and malware on several employees' computers certainly qualifies to raising to an incident.
upvoted 1 times
...
Moddybaba
1 year, 3 months ago
What is antimalware (anti-malware)? Antimalware is a type of software program created to protect information technology (IT) systems and individual computers from malicious software, or malware. Antimalware programs scan a computer system to prevent, detect and remove malware. D is obviously the answer.
upvoted 1 times
...
oluchecpoint
1 year, 3 months ago
D. Suspicious network traffic originating from the demilitarized zone (DMZ). Suspicious network traffic from the DMZ is a more serious and potentially indicative of a security breach or intrusion attempt. The DMZ is a critical part of the network that sits between the external (untrusted) network and the internal (trusted) network. Any suspicious activity from this zone should be treated with utmost seriousness as it may signify a direct attempt to breach the organization's perimeter defenses or compromise the web-based services. While the other events listed (A, B, and C) could be important and may require investigation, they are typically of lower severity compared to suspicious traffic from the DMZ. Anti-malware alerts, port scans, and failed login attempts are relatively common and may not necessarily indicate an ongoing security breach, although they should still be monitored and investigated as part of regular security operations.
upvoted 1 times
...
david124
1 year, 4 months ago
Selected Answer: D
clearly D look at the wording of the question, please don't post a vote until you do research
upvoted 2 times
...
Goseu
1 year, 4 months ago
Selected Answer: A
If its something its A . Although its irrelevant to web servers.
upvoted 1 times
...
Jae_kes
1 year, 6 months ago
Selected Answer: D
D. Suspicious network traffic originating from the demilitarized zone (DMZ). Suspicious network traffic originating from the DMZ can indicate unauthorized access attempts or potentially malicious activity targeting the organization's web-based services. This type of event raises concerns about the security and integrity of the web server and the potential impact on the organization's operations, data, and customer information.
upvoted 1 times
...
sedardna
1 year, 6 months ago
Selected Answer: A
No se escala nada hasta que no se valora , luego A
upvoted 1 times
...
richck102
1 year, 6 months ago
D. Suspicious network traffic originating from the demilitarized zone (DMZ)
upvoted 1 times
...
mad68
1 year, 7 months ago
Selected Answer: D
Suspicious network traffic originating from the demilitarized zone (DMZ): Suspicious network traffic originating from the DMZ is a significant event that could indicate an attempted or ongoing attack on the organization's web-based services. This event would likely initiate an incident response plan and be escalated to management.
upvoted 1 times
...
cangurer
1 year, 9 months ago
A is correct, in order to start incident response you have to be sure that there is an incident. Suspicious traffic needs to be checked first.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...