Exam CS0-002 All QuestionsBrowse all questions from this exam
Question 392

A consumer credit card database was compromised, and multiple representatives are unable to review the appropriate customer information. Which of the following should the cybersecurity analyst do first?

    Correct Answer: A

    In the event that a consumer credit card database has been compromised and multiple representatives are unable to review the appropriate customer information, the cybersecurity analyst's first priority should be to start the containment effort. Containment is crucial to prevent further damage and limit the extent of the breach. This step involves identifying and isolating affected systems to stop the incident from spreading and causing more harm. Once containment is achieved, the analyst can then move on to other steps, such as notifying senior management and law enforcement if necessary.

Discussion
karpalOption: D

the question said already that the database is compromised -> so the incident is confirmed already. we are in identification phase at this moment. next step in identification phase would be to inform the stakeholders (senior management). I chose D Then and only then we would move to third step in Incident Response which would be Containment.

tutita

I concur, cant be b since "A consumer credit card database was compromised" its been compromised, the breach already happened, next step will inform the management and then containment.

tutita

option D

KartibokOption: B

So in real life I see it going this way. Incidents raised and passed to the cyber team. Then, I would go B as the analyst would then confirm the incident. The others would then be in order of the communications plan - and an analyst going directly to the senior management team doesn't seem to fit with his remit or direct responsibility.

Hershey2025Option: B

Correct answer is B. Make sure the incident has occurred.

CyberCEHOption: B

Answer B

zecomeia_007Option: B

Confirm the incident (B): Before any other actions are taken, it is crucial to verify that a security incident has indeed occurred. This involves gathering and analyzing information to ensure that the breach is real and not a false positive.

TAC45Option: B

the cybersecurity analyst should first confirm the incident. Confirming the incident involves gathering evidence, assessing the scope and impact of the compromise, and verifying that a security breach has indeed occurred. By confirming the incident, the cybersecurity analyst can ensure that appropriate actions are taken to address the situation effectively. Once the incident is confirmed, the analyst can proceed with other necessary steps such as containment efforts, notifying relevant parties, and informing the senior management team. - chatgbt

SecurityGuyPP

stop using chatgpt for answers....its not always 100% correct. The Incident is already compromised, you don't need to confirm again, next step is D

skibby16Option: B

When a cybersecurity incident is suspected, the first step is to confirm whether an incident has indeed occurred. This involves investigating the initial reports, gathering more information, and verifying the scope and nature of the incident. Only after confirming the incident can the appropriate actions, such as containment and notification, be initiated. Then ACD

Saphi

I'm honestly not sure on this one but since the question says it's 'been compromised' and not 'suspected of being compromised' I would assume it's not B. It's either going to be carrying on with the identification stage or moving onto the containment stage.

Abz1999Option: D

Agree with karpal

rg00Option: B

Confirm if it is really compromised.

Big_Dre

they already said it has been compromised