New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISA Exam - Topic 4 Question 48 Discussion

Actual exam question for Isaca's CISA exam
Question #: 48
Topic #: 4
[All CISA Questions]

Which of the following is the BEST control to mitigate the malware risk associated with an instant messaging (IM) system?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Sabrina
4 months ago
Encrypting IM traffic sounds good, but is it really effective against malware?
upvoted 0 times
...
Viola
4 months ago
Allowing only corporate IM solutions is the best way to go!
upvoted 0 times
...
Desmond
4 months ago
Wait, can blocking external IM traffic really help that much?
upvoted 0 times
...
Ceola
4 months ago
Totally agree, that’s the easiest way to stop malware!
upvoted 0 times
...
Janey
5 months ago
I think blocking attachments in IM is a solid move.
upvoted 0 times
...
Miesha
5 months ago
Allowing only corporate IM solutions seems like a solid option, but I feel like it might limit communication too much.
upvoted 0 times
...
Bettina
5 months ago
Encrypting IM traffic sounds important, but I wonder if it really addresses the malware risk directly.
upvoted 0 times
...
Francene
5 months ago
I remember a practice question where blocking external IM traffic was considered effective, but I can't recall the details.
upvoted 0 times
...
Ona
5 months ago
I think blocking attachments in IM might be a good start, but I'm not sure if it's the best overall control.
upvoted 0 times
...
Jose
5 months ago
The question is asking about the features, so I'll focus on identifying the two most relevant options from the list. Capturing the IP address and e-signature seem like good choices, but I'm not 100% sure.
upvoted 0 times
...
Belen
5 months ago
I'm a bit confused because round-about doesn't sound right, but I can't recall if meet-in-the-middle is also costly.
upvoted 0 times
...
Lonny
5 months ago
Alright, I've got this. The "-si" flag is used to conduct an IDLE scan, which leverages another host's IP ID sequence to mask your own identity and avoid detection. By sending spoofed packets from the IDLE host, you can gather information about the target systems without leaving your own fingerprint. This is a clever technique, so I feel pretty confident about this one.
upvoted 0 times
...
Page
5 months ago
Prototyping sounds like the right approach here. That's how you can simulate the final design and ensure the development is on track.
upvoted 0 times
...

Save Cancel