Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca Exam CISM Topic 4 Question 93 Discussion

Actual exam question for Isaca's CISM exam
Question #: 93
Topic #: 4
[All CISM Questions]

Identifying which of the following BEST enables a cyberattack to be contained?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Phung
2 months ago
Haha, this is a tough one! Guess I'll have to go with the 'IP address of the computer that launched the attack' - it's like trying to catch a cyber-criminal with their digital fingerprints!
upvoted 0 times
Gary
1 months ago
I agree, knowing the IP address can help track down the attacker.
upvoted 0 times
...
Daren
2 months ago
I think the vulnerability exploited is crucial for containment.
upvoted 0 times
...
...
Rickie
2 months ago
I see your point, but I think D) The threat actor that initiated the attack is crucial for containing the attack as well, so we can prevent future attacks from the same actor.
upvoted 0 times
...
Audra
2 months ago
I disagree, I believe it's B) The segment targeted by the attack because containing the attack involves isolating the affected segment.
upvoted 0 times
...
Cecil
2 months ago
Hmm, I'd have to say A. The vulnerability exploited is the root cause, so addressing that should be the priority for containment.
upvoted 0 times
Barbra
2 months ago
Yes, understanding the weakness that was exploited is crucial for effective containment.
upvoted 0 times
...
France
2 months ago
I agree, focusing on the vulnerability is key to containing the cyberattack.
upvoted 0 times
...
...
Armando
3 months ago
I'm going with D. Knowing the threat actor behind the attack would give us valuable insights to prevent future incidents.
upvoted 0 times
...
Meaghan
3 months ago
I think the answer is A) The vulnerability exploited by the attack.
upvoted 0 times
...
Abraham
3 months ago
C seems like the right answer to me. If we can identify the IP address of the attacking computer, we can block that specific source and stop the attack.
upvoted 0 times
Carylon
1 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Dalene
1 months ago
Agreed, blocking the source is key.
upvoted 0 times
...
Gaston
1 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Von
1 months ago
Identifying the IP address is crucial for containment.
upvoted 0 times
...
Lou
1 months ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Peggy
1 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Adrianna
2 months ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Ira
2 months ago
B) The segment targeted by the attack
upvoted 0 times
...
Hector
2 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Daron
2 months ago
B) The segment targeted by the attack
upvoted 0 times
...
Tamesha
2 months ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
Tuyet
2 months ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...
Lynelle
3 months ago
I think the answer is B. The segment targeted by the attack would be the key to containing the attack, as it would allow us to isolate and mitigate the affected area.
upvoted 0 times
Dick
2 months ago
Definitely, isolating the affected area is crucial in mitigating the attack.
upvoted 0 times
...
Winfred
2 months ago
I agree, B) The segment targeted by the attack would help contain the cyberattack.
upvoted 0 times
...
Pamela
2 months ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Nida
2 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Audry
3 months ago
B) The segment targeted by the attack
upvoted 0 times
...
Avery
3 months ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77