New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CISM Exam - Topic 5 Question 5 Discussion

Actual exam question for Isaca's CISM exam
Question #: 5
Topic #: 5
[All CISM Questions]

Which of the following is the BEST method to defend against social engineering attacks?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
James
4 months ago
Monitoring access attempts is important too, though.
upvoted 0 times
...
Beckie
4 months ago
Wait, are antivirus scans really effective against social engineering?
upvoted 0 times
...
Elena
4 months ago
But can we really trust people to follow guidelines?
upvoted 0 times
...
Ahmad
4 months ago
Totally agree! Keeping info private is key.
upvoted 0 times
...
Selma
5 months ago
I think option C is the best way to go.
upvoted 0 times
...
Aliza
5 months ago
I feel like monitoring unauthorized access attempts (option A) is important, but it might not directly prevent social engineering attacks.
upvoted 0 times
...
Stefan
5 months ago
I'm not entirely sure, but I remember a practice question that emphasized the importance of user awareness and training, which seems related to option C as well.
upvoted 0 times
...
Margart
5 months ago
I think option C makes the most sense since social engineering often relies on publicly available information.
upvoted 0 times
...
Ira
5 months ago
I recall discussing how web-content filtering (option B) can help, but I'm not convinced it's the best defense against social engineering specifically.
upvoted 0 times
...
Kathrine
5 months ago
Okay, I think I've got this. Based on the SPI and cost variance, I'll recommend corrective actions to get the project back on track. That should be a solid solution to present.
upvoted 0 times
...
Sage
5 months ago
This looks like a straightforward question about the capabilities of VMware Cloud Director App Launchpad. I think I have a good understanding of the features, so I'll carefully read through the options and select the one that best matches the description.
upvoted 0 times
...
Cathrine
5 months ago
I think I've got it! With a /26 subnet mask, we're using 6 bits for the subnet, so we'll have 2^6 = 4 subnets. And each subnet will have 2^(32-26) = 64 host addresses.
upvoted 0 times
...
Isaiah
5 months ago
I'm feeling pretty confident about this one. The options seem straightforward, and I think I can quickly identify the correct replacement for the if block.
upvoted 0 times
...

Save Cancel