New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 5 Question 34 Discussion

Actual exam question for Isaca's CISM exam
Question #: 34
Topic #: 5
[All CISM Questions]

Which of the following is an information security manager's BEST course of Action when a threat intelligence report indicates a large number of ransomware attacks targeting the industry?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Queenie
4 months ago
Wait, are ransomware attacks really that common now?
upvoted 0 times
...
Sarah
4 months ago
I think reviewing security controls is crucial too.
upvoted 0 times
...
Cathrine
4 months ago
Increasing backups is a smart move!
upvoted 0 times
...
Frederica
4 months ago
Not sure if notifying staff is enough.
upvoted 0 times
...
Nakisha
5 months ago
Definitely should assess the risk first!
upvoted 0 times
...
Cathrine
5 months ago
I feel like reviewing mitigating security controls could help us understand our vulnerabilities better, but I’m not entirely confident about the order of actions.
upvoted 0 times
...
Ardella
5 months ago
Increasing the frequency of backups sounds like a good idea, but I wonder if reviewing security controls might be more effective in the long run.
upvoted 0 times
...
Mira
5 months ago
I remember a practice question where notifying staff was important, but I feel like we need to do more than just that.
upvoted 0 times
...
Buck
5 months ago
I think assessing the risk to the organization is crucial, but I'm not sure if it's the best immediate action.
upvoted 0 times
...
Alayna
5 months ago
Hmm, I'm not entirely sure about this one. The options seem a bit broad, and I'm not confident I fully understand the specific implications of digitization in this context. I'll have to think it through.
upvoted 0 times
...
Elvera
5 months ago
I definitely recall that in a BGP route reflector setup, you usually need to designate clients correctly. I lean towards A and E based on what I studied.
upvoted 0 times
...
Louvenia
5 months ago
Okay, I think I've got it. Based on Roberta's findings about low-level employees having access to all customer data, including financial records, and the lack of proper data purging procedures, option A seems like the most plausible explanation for the breach. I'll go with that.
upvoted 0 times
...
Temeka
5 months ago
Option A looks like the most direct solution - creating a custom self-registration page and Apex handler to create person accounts. That seems like the cleanest way to ensure the new users are properly captured.
upvoted 0 times
...
Doretha
5 months ago
I'm a bit unsure here; are public donations really an opportunity if they're declining? I feel like A and B might not fit.
upvoted 0 times
...
Romana
5 months ago
Not sure, but I think centerless architecture is a characteristic of some NoSQL databases, but does that apply to Alibaba's service?
upvoted 0 times
...
Ulysses
5 months ago
This looks like a straightforward question on secure email protocols. I'm pretty confident I can get this one right.
upvoted 0 times
...

Save Cancel