Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 4 Question 93 Discussion

Actual exam question for Isaca's CISM exam
Question #: 93
Topic #: 4
[All CISM Questions]

Identifying which of the following BEST enables a cyberattack to be contained?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Jenelle
4 months ago
The threat actor's identity matters too, right?
upvoted 0 times
...
Chun
5 months ago
Wait, can we really contain an attack just by knowing the IP address?
upvoted 0 times
...
Grover
5 months ago
Agree, segment targeted is key for containment!
upvoted 0 times
...
Jarod
5 months ago
I think it's more about the segment targeted.
upvoted 0 times
...
Alexia
5 months ago
It's definitely about the vulnerability exploited.
upvoted 0 times
...
Cecilia
5 months ago
I feel like knowing the threat actor could be important too, but it seems more about prevention than containment.
upvoted 0 times
...
Cheryl
6 months ago
The IP address might help track the source, but I don't think it directly helps with containment.
upvoted 0 times
...
Joseph
6 months ago
I'm not so sure about that. I remember a practice question where the vulnerability itself was key to stopping the attack.
upvoted 0 times
...
Lucia
6 months ago
I think the segment targeted by the attack is crucial for containment. If we know where it hit, we can isolate it better.
upvoted 0 times
...
Cecilia
6 months ago
The threat actor is an interesting angle, but I'm not sure that's the most practical information for actually containing the cyberattack. I'll have to weigh the options carefully.
upvoted 0 times
...
Sommer
6 months ago
I'm pretty confident the IP address of the attacker is not the best answer here. That might help identify them, but doesn't directly address how to stop the attack.
upvoted 0 times
...
Jose
6 months ago
Hmm, I'm not sure. The segment targeted could also be important for containing the spread, right? I'll have to think this through carefully.
upvoted 0 times
...
Kara
6 months ago
This is a tricky one. I think the key is to focus on how to contain the attack, not just identify the attacker. The vulnerability exploited seems like the most relevant factor for that.
upvoted 0 times
...
Phung
1 year ago
Haha, this is a tough one! Guess I'll have to go with the 'IP address of the computer that launched the attack' - it's like trying to catch a cyber-criminal with their digital fingerprints!
upvoted 0 times
Gary
1 year ago
I agree, knowing the IP address can help track down the attacker.
upvoted 0 times
...
Daren
1 year ago
I think the vulnerability exploited is crucial for containment.
upvoted 0 times
...
...
Rickie
1 year ago
I see your point, but I think D) The threat actor that initiated the attack is crucial for containing the attack as well, so we can prevent future attacks from the same actor.
upvoted 0 times
...
Audra
1 year ago
I disagree, I believe it's B) The segment targeted by the attack because containing the attack involves isolating the affected segment.
upvoted 0 times
...
Cecil
1 year ago
Hmm, I'd have to say A. The vulnerability exploited is the root cause, so addressing that should be the priority for containment.
upvoted 0 times
Barbra
1 year ago
Yes, understanding the weakness that was exploited is crucial for effective containment.
upvoted 0 times
...
France
1 year ago
I agree, focusing on the vulnerability is key to containing the cyberattack.
upvoted 0 times
...
...
Armando
1 year ago
I'm going with D. Knowing the threat actor behind the attack would give us valuable insights to prevent future incidents.
upvoted 0 times
...
Meaghan
1 year ago
I think the answer is A) The vulnerability exploited by the attack.
upvoted 0 times
...
Abraham
1 year ago
C seems like the right answer to me. If we can identify the IP address of the attacking computer, we can block that specific source and stop the attack.
upvoted 0 times
Carylon
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Dalene
1 year ago
Agreed, blocking the source is key.
upvoted 0 times
...
Gaston
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Von
1 year ago
Identifying the IP address is crucial for containment.
upvoted 0 times
...
Lou
1 year ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Peggy
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Adrianna
1 year ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Ira
1 year ago
B) The segment targeted by the attack
upvoted 0 times
...
Hector
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Daron
1 year ago
B) The segment targeted by the attack
upvoted 0 times
...
Tamesha
1 year ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
Tuyet
1 year ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...
Lynelle
1 year ago
I think the answer is B. The segment targeted by the attack would be the key to containing the attack, as it would allow us to isolate and mitigate the affected area.
upvoted 0 times
Dick
1 year ago
Definitely, isolating the affected area is crucial in mitigating the attack.
upvoted 0 times
...
Winfred
1 year ago
I agree, B) The segment targeted by the attack would help contain the cyberattack.
upvoted 0 times
...
Pamela
1 year ago
D) The threat actor that initiated the attack
upvoted 0 times
...
Nida
1 year ago
C) The IP address of the computer that launched the attack
upvoted 0 times
...
Audry
1 year ago
B) The segment targeted by the attack
upvoted 0 times
...
Avery
1 year ago
A) The vulnerability exploited by the attack
upvoted 0 times
...
...

Save Cancel