Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CISM topic 1 question 121 discussion

Actual exam question from Isaca's CISM
Question #: 121
Topic #: 1
[All CISM Questions]

An organization has experienced multiple instances of privileged users misusing their access. Which of the following processes would be MOST helpful in identifying such violations?

  • A. Policy exception review
  • B. Review of access controls
  • C. Security assessment
  • D. Log review
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
oluchecpoint
2 months, 2 weeks ago
Selected Answer: D
D. Log review. The key word in the question is "identify" Log review involves examining logs and audit trails generated by the organization's systems and applications. It allows for the monitoring and detection of unusual or unauthorized activities, including instances where privileged users misuse their access rights. By analyzing logs, you can track actions taken by privileged users, identify anomalies, and detect any inappropriate or suspicious behavior.
upvoted 1 times
...
oluchecpoint
7 months, 2 weeks ago
D. Log review. The key word in the question is "identify" Log review involves examining logs and audit trails generated by the organization's systems and applications. It allows for the monitoring and detection of unusual or unauthorized activities, including instances where privileged users misuse their access rights. By analyzing logs, you can track actions taken by privileged users, identify anomalies, and detect any inappropriate or suspicious behavior.
upvoted 1 times
...
DavoA
9 months ago
Selected Answer: D
Log review reveals all!
upvoted 1 times
...
Jae_kes
10 months, 2 weeks ago
Selected Answer: D
D. Log review
upvoted 1 times
...
DASH_v
10 months, 3 weeks ago
Selected Answer: B
Need a thorough access control review to identify all possible reasons including, the review shall include monitoring and logging. Log review itself is not sufficiently enough.
upvoted 1 times
...
richck102
11 months ago
D. Log review
upvoted 1 times
...
Abhey
11 months, 3 weeks ago
Selected Answer: D
The MOST helpful process in identifying privileged user misuse would be log review. This process involves examining logs from various systems and applications to detect any suspicious activity, such as unauthorized access, changes to permissions, or unusual login behavior
upvoted 2 times
...
dedfef
11 months, 4 weeks ago
Selected Answer: B
the correct answer is B
upvoted 1 times
...
Broesweelies
1 year, 3 months ago
Selected Answer: D
A log review is the process of analyzing system and security logs to identify potential security incidents. This process can reveal patterns of suspicious activity, such as a privileged user accessing sensitive data that they shouldn't have access to, or making changes to systems that they shouldn't be able to make. By reviewing the logs, the organization can identify violations of security policies and procedures, detect unusual or suspicious activity, and trace the activity back to the individual who performed it.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...