Exam CISM All QuestionsBrowse all questions from this exam
Question 71

When monitoring the security of a web-based application, which of the following is MOST frequently reviewed?

    Correct Answer: B

    When monitoring the security of a web-based application, access logs are most frequently reviewed because they provide real-time information about user activities such as login attempts, resource access, and other relevant events. This helps in identifying suspicious or unauthorized activities promptly, which is essential for maintaining the security of the application.

Discussion
CytrailOption: B

Logs should be reviewed often not reports. Reports are generated as needed, logs are aggregated on the fly.

richck102Option: B

B. Access logs

Endy007

Could you kindly clarify from which section of the CISM exam questions are expected? In other words, which question numbers correspond to the current section being addressed? I'm seeking assistance from someone who has taken the exam and can provide guidance on this matter.

usercism007

This question is from Domain 3 and Domin 4 combined.

oluchecpointOption: B

Access logs are the most frequently reviewed when monitoring the security of a web-based application because they provide valuable real-time information about user activity and potential security threats.

ViperhunterOption: B

Access logs provide a detailed record of activities related to user access, including login attempts, resource access, and other relevant events. Monitoring access logs is a common practice in web application security to identify any suspicious or unauthorized activities. It helps in detecting potential security incidents, such as unauthorized access attempts, unusual patterns of behavior, or potential exploitation of vulnerabilities. While audit reports (option A) may provide a broader overview of security-related events, access logs are more specific to user interactions with the web application. Access lists (option C) are typically associated with network security and may not be as directly relevant to web application monitoring. Threat metrics (option D) can be important but may not be as frequently reviewed as access logs for day-to-day monitoring.

oluchecpointOption: B

A. Access logs are the most frequently reviewed when monitoring the security of a web-based application because they provide valuable real-time information about user activity and potential security threats.

oluchecpoint

Correction!!! B. Access logs

STUDYER2

what is access list?

AntonivsOption: B

B is correct

dark7nessOption: B

B is correct

MSKidOption: A

Access Logs are viewed more than the offered answers. Some support from CISM AIO 2nd under Logging

CharlesL

???? But you chose A