The very first step in the incident response process should always be to validate the potential breach. In other words, confirm that there actually has been a breach. Without this step, you may end up wasting time and resources on an incident that never even happened! Validation is the critical first step, so D is the correct answer.
Before taking any further steps in responding to a suspected breach, it is critical first to confirm whether a breach has indeed occurred. This involves researching and investigating the alert to ascertain its validity. D is the answer
Key word Suspected..Are you going to do more research to find out if you have been hacked. Or are you going to call your boss and tell them " you MAY have been hacked"
This section is not available anymore. Please use the main Exam Page.CISA Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
spar2kle
8 months agobabadook13
8 months, 3 weeks agoItsBananass
11 months agohoho
11 months, 2 weeks agohoho
11 months, 4 weeks agoDavid_Hu
1 year, 4 months ago