exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 476 discussion

Actual exam question from Isaca's CISM
Question #: 476
Topic #: 1
[All CISM Questions]

Several months after the installation of a new firewall with intrusion prevention features to block malicious activity, a breach was discovered that came in through the firewall shortly after installation. This breach could have been detected earlier by implementing firewall:

  • A. web surfing controls
  • B. packet filtering
  • C. application awareness
  • D. log monitoring
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Manzer
Highly Voted 2 years, 1 month ago
Selected Answer: D
Logs would have gone to a SIEM.
upvoted 5 times
...
Thavee
Most Recent 9 months, 1 week ago
Selected Answer: A
Poor question. Now all firewalls come with log reporting and notifications. Install extra log monitoring would not help at all but waste of money. If a breach came thru, that must be from the untrained user(s)/insider(s) who brought in the malicious/Trojan/remote control software over the download files. Check cyber kill chain.
upvoted 1 times
...
Marcelus1714
9 months, 3 weeks ago
Selected Answer: D
the best here is D...
upvoted 1 times
...
oluchecpoint
1 year, 4 months ago
Selected Answer: D
D. log monitoring Log monitoring involves analyzing the logs generated by the firewall and other network devices to identify suspicious or malicious activity. It allows you to proactively detect and respond to security incidents, including breaches, by reviewing logs for signs of unauthorized access or unusual behavior. While web surfing controls, packet filtering, and application awareness are important security measures, they may not necessarily detect breaches as effectively
upvoted 3 times
...
richck102
1 year, 6 months ago
D. log monitoring
upvoted 1 times
...
kortcl
1 year, 8 months ago
Selected Answer: B
If you're not inspecting packets how would it knows what traffic is coming through? Amswer should be B.
upvoted 3 times
...
Wladysk
1 year, 11 months ago
Selected Answer: C
For detection C is also an option. Integrating application awareness into security solutions provides them with valuable context that can improve network security as well as network routing.
upvoted 1 times
...
beever
1 year, 11 months ago
Selected Answer: D
It should be D - Log Monitoring since the wording "could have been detected earlier". Its about detection methods.
upvoted 4 times
...
MyKasala
2 years ago
I guess D
upvoted 2 times
...
aokisan
2 years ago
Selected Answer: C
maybe C. ambiguous question.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...