exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 605 discussion

Actual exam question from Isaca's CISM
Question #: 605
Topic #: 1
[All CISM Questions]

Which of the following is MOST important to determine following the discovery and eradication of a malware attack?

  • A. The creator of the malware
  • B. The malware entry path
  • C. The type of malware involved
  • D. The method of detecting the malware
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Manzer
Highly Voted 2 years ago
Selected Answer: B
After eradication it is looking for the root cause.
upvoted 12 times
...
Thavee
Most Recent 9 months ago
Selected Answer: D
the question asked. Which of the following is MOST important to determine following the discovery and eradication of a malware attack. TO DETERMINE, the discovery and eradication of a malware attack (may be tomorrow). Since this is not happening, I will never know which the exact entry path is (assumption would be possible), so the key point is how fast i can detect the malware and what tool/method is to be used to detect the malware. anyway, in the exam, I would go with B.Just to pass. Disagreed to many CISM Exam questions/answers. Not practical in real life at all.
upvoted 3 times
...
koala_lay
1 year, 3 months ago
Selected Answer: B
Malware path is the most important Agree to Answer B
upvoted 1 times
...
CISSPST
1 year, 4 months ago
Why would you go back to determining the method of detection of malware after the malware has been detected and eradicated? This could be done as part of root cause analysis to improve detection methods and prevent similar incidents from occurring in future. After discovery and eradication of malware, to recover systems and ensure that it is safe to return them to production, it is important to ensure that all vulnerabilities have been addressed and the systems are not subject to the same attack again This requires you to understand the threat vector, i.e., entry path of malware. Finding out the creator is not as important. The type of malware can be important, but not as important as making sure that all the holes in the boat are first identified and closed. Afterall, you do not want to drown trying to understand the shape and source of the holes. Answer: B
upvoted 1 times
Thavee
9 months ago
nop. the question asked. Which of the following is MOST important to determine following the discovery and eradication of a malware attack. TO DETERMINE, the discovery and eradication of a malware attack (may be tomorrow). Since this is not happening, I will never know which the exact entry path is (assumption would be possible), so the key point is how fast i can detect the malware and what tool/method is to be used to detect the malware.
upvoted 1 times
...
...
richck102
1 year, 6 months ago
B. The malware entry path
upvoted 1 times
...
CarlLimps
1 year, 10 months ago
Selected Answer: B
it's gotta be B. - entry path, otherwise you will continue to get compromised.
upvoted 4 times
...
Broesweelies
1 year, 11 months ago
What Manzer said
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...