New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 ISSAP Exam - Topic 3 Question 11 Discussion

Actual exam question for ISC2's ISSAP exam
Question #: 11
Topic #: 3
[All ISSAP Questions]

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Show Suggested Answer Hide Answer
Suggested Answer: B, C, D

process is responsible for supporting and building up the incident combating process. It ensures the stability of the system and also confirms

that the incident does not get any worse. The Containment phase includes the process of preventing further contamination of the system or

network, and preserving the evidence of the contamination.

The loss done to the system due to spamming is recovered using the recovery phase. The Recovery phase of the Incident handling process is

the stage at which the enterprise or the system is settled back to its balanced production state. It involves the quality assurance tests and

re-evaluation of the system for the purpose of the system revival or recovery.

The Eradication phase of the Incident handling process involves the cleaning-up of the identified harmful incidents from the system. It includes

the analyzing of the information that has been gathered for determining how the attack was committed. To prevent the incident from

happening again, it is vital to recognize how it was conceded out so that a prevention technique is applied.


Contribute your Thoughts:

0/2000 characters
Denna
4 months ago
Surprised this wasn't caught earlier, seems like a basic issue!
upvoted 0 times
...
Gilbert
4 months ago
Wait, is Contamination even a real phase?
upvoted 0 times
...
Royal
4 months ago
Recovery might not be necessary if we fix it right away.
upvoted 0 times
...
Erinn
4 months ago
I think Eradication is crucial too.
upvoted 0 times
...
Felix
5 months ago
Definitely needs Identification first!
upvoted 0 times
...
Aileen
5 months ago
I feel like Recovery might be relevant too, especially if we need to restore the email system after addressing the spam issue.
upvoted 0 times
...
Stephanie
5 months ago
I remember a practice question that mentioned Preparation as a key phase, but I'm not sure if it applies here since the issue has already occurred.
upvoted 0 times
...
Desmond
5 months ago
I'm a bit unsure about the Eradication phase. Do we need to remove the vulnerabilities before we can recover?
upvoted 0 times
...
Dortha
5 months ago
I think the Identification phase is definitely involved since we need to pinpoint how the spammers are exploiting the email process.
upvoted 0 times
...
Katy
5 months ago
I'm a bit confused by this question. Is it asking about the specific command to prepare the namespace, or just the general process of setting up a namespace for Event Manager? I want to make sure I understand the question fully before answering.
upvoted 0 times
...
Carlene
5 months ago
Hmm, I'm not entirely sure about this one. I know we're supposed to respond to Cisco Threat Response notifications, but I'm not sure if adding the file to the block list is the right move. Maybe I should wait for Cisco Threat Response to automatically block the malware?
upvoted 0 times
...
Gaston
5 months ago
Option B looks interesting, but I'm not sure if using a Lightning Page for the Lightning override is the best approach here. Wouldn't a Lightning Component be more flexible and easier to reuse across interfaces?
upvoted 0 times
...

Save Cancel