New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 4 Question 93 Discussion

Actual exam question for Isaca's CISM exam
Question #: 93
Topic #: 4
[All CISM Questions]

Identifying which of the following BEST enables a cyberattack to be contained?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Jenelle
3 months ago
The threat actor's identity matters too, right?
upvoted 0 times
...
Chun
3 months ago
Wait, can we really contain an attack just by knowing the IP address?
upvoted 0 times
...
Grover
3 months ago
Agree, segment targeted is key for containment!
upvoted 0 times
...
Jarod
4 months ago
I think it's more about the segment targeted.
upvoted 0 times
...
Alexia
4 months ago
It's definitely about the vulnerability exploited.
upvoted 0 times
...
Cecilia
4 months ago
I feel like knowing the threat actor could be important too, but it seems more about prevention than containment.
upvoted 0 times
...
Cheryl
4 months ago
The IP address might help track the source, but I don't think it directly helps with containment.
upvoted 0 times
...
Joseph
4 months ago
I'm not so sure about that. I remember a practice question where the vulnerability itself was key to stopping the attack.
upvoted 0 times
...
Lucia
5 months ago
I think the segment targeted by the attack is crucial for containment. If we know where it hit, we can isolate it better.
upvoted 0 times
...
Cecilia
5 months ago
The threat actor is an interesting angle, but I'm not sure that's the most practical information for actually containing the cyberattack. I'll have to weigh the options carefully.
upvoted 0 times
...
Sommer
5 months ago
I'm pretty confident the IP address of the attacker is not the best answer here. That might help identify them, but doesn't directly address how to stop the attack.
upvoted 0 times
...
Jose
5 months ago
Hmm, I'm not sure. The segment targeted could also be important for containing the spread, right? I'll have to think this through carefully.
upvoted 0 times
...
Kara
5 months ago
This is a tricky one. I think the key is to focus on how to contain the attack, not just identify the attacker. The vulnerability exploited seems like the most relevant factor for that.
upvoted 0 times
...
Phung
12 months ago
Haha, this is a tough one! Guess I'll have to go with the 'IP address of the computer that launched the attack' - it's like trying to catch a cyber-criminal with their digital fingerprints!
upvoted 0 times
Gary
11 months ago
I agree, knowing the IP address can help track down the attacker.
upvoted 0 times
...
Daren
11 months ago
I think the vulnerability exploited is crucial for containment.
upvoted 0 times
...
...
Rickie
12 months ago
I see your point, but I think D) The threat actor that initiated the attack is crucial for containing the attack as well, so we can prevent future attacks from the same actor.
upvoted 0 times
...
Audra
12 months ago
I disagree, I believe it's B) The segment targeted by the attack because containing the attack involves isolating the affected segment.
upvoted 0 times
...
Cecil
1 year ago
Hmm, I'd have to say A. The vulnerability exploited is the root cause, so addressing that should be the priority for containment.
upvoted 0 times
Barbra
11 months ago
Yes, understanding the weakness that was exploited is crucial for effective containment.
upvoted 0 times
...
France
12 months ago
I agree, focusing on the vulnerability is key to containing the cyberattack.
upvoted 0 times
...
...
Armando
1 year ago
I'm going with D. Knowing the threat actor behind the attack would give us valuable insights to prevent future incidents.
upvoted 0 times
...
Meaghan
1 year ago
I think the answer is A) The vulnerability exploited by the attack.
upvoted 0 times
...
Abraham
1 year ago
C seems like the right answer to me. If we can identify the IP address of the attacking computer, we can block that specific source and stop the attack.
upvoted 0 times
Carylon
11 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Dalene
11 months ago
Agreed, blocking the source is key.
upvoted 0 times
...
Gaston
11 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Von
11 months ago
Identifying the IP address is crucial for containment.
upvoted 0 times
...
Lou
11 months ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Peggy
11 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Adrianna
11 months ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Ira
12 months ago
B) The segment targeted by the attack
upvoted 0 times
...
Hector
12 months ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Daron
12 months ago
B) The segment targeted by the attack
upvoted 0 times
...
Tamesha
12 months ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
Tuyet
1 year ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...
Lynelle
1 year ago
I think the answer is B. The segment targeted by the attack would be the key to containing the attack, as it would allow us to isolate and mitigate the affected area.
upvoted 0 times
Dick
12 months ago
Definitely, isolating the affected area is crucial in mitigating the attack.
upvoted 0 times
...
Winfred
12 months ago
I agree, B) The segment targeted by the attack would help contain the cyberattack.
upvoted 0 times
...
Pamela
1 year ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Nida
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Audry
1 year ago
B) The segment targeted by the attack
upvoted 0 times
...
Avery
1 year ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...

Save Cancel