Which is the MOST important to enable a timely response to a security breach?
A. Knowledge sharing and collaboration
B. Security event logging
C. Roles and responsibilities
D. Forensic analysis
Correct Answer: B???? or C?????
______________________
Note
■ The official answer (could be incorrect because NO comes from ISACA!) is: "B. Security event logging".
■ Other experts claim that the correct answer is: "C. Roles and responsibilities".
■ This question, in my opinion, is unclear because:
• B. Security event logging = is the correct answer if the context requested by the question is at an operational level, then SIEM, in this case, is very useful in fact thanks to SIEM the response to the incident at the operational level will be more efficient
• C. Roles and responsibilities = is the correct answer if the context to which the question refers is the incident response plan (IRP), then it is evident that having an IRP that clarifies "who does what" (roles and responsibilities) then the response to the incident will be more efficient.
■ Your expert opinion (and explanation) is strongly requested.
Step by stepSolved in 2 steps
- The technical term for attackers who launch attacks against other users and their computers is ______. a. threat actor b. risk seeker c. cyber invader d. danger agentarrow_forwardHi, please try to answer all themultiple chooise question below. I apperciat your help. Thanks [1] The function of the BIA process that can support the security effort is: [A] The identification of single points of failure (SPOFs).[B] The identification of Multiple points of failure (SPOFs).[C] The identification of operating Staff.[D] B and C [2] Like critical aspects, SPOFs can be caused by: [A] Hardware[B] Software[C] Processes, or Personnel[D] All [3] _____________ denotes those aspects of the organization without which the organization could not operate or exist. [A] Criticality[B] SPOF (Single Point of Failure[C] MPOF (Multiple Point of Failure)[D] B and C [4] Among ways to address risk include: [A] Risk Transfer [B] Risk Mitigation [C] Risk Avoidance [D] Risk Acceptance [E] All [5] __________ is the level, amount, or type of risk that the organization finds acceptable. [A] Residual Risk [B] Risk Appetite [C] Risk Assessment [D] Risk Avoidance[6] When we choose to…arrow_forwardWhich of the following is NOT a significant, adverse impact from a cyber breach? Choose the BEST answer. a) Fines b) Regulator scrutiny c) Negative publicity d) Modificaiton of internal proceduresarrow_forward
- How can intentional computer damage be prevented in the future? What security holes are used in this situation?arrow_forwardWhich of the following statements are FALSE regarding the process of managing cyber security incidents? a. The containment phase is concerned with limiting the ongoing damage from the incident. b. An incident report is produced as part of the recovery phase.. c. Weaknesses that are identified as leading to d. An event must be classified as an incident before a response is mobilisarrow_forwardQuestion 15 True or False: Separating the parking lot from the facilities building is a proactive security measure that can minimize threats within the critical space. O True Select the appropriate response False Submit Responsearrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education