CISM Exam QuestionsBrowse all questions from this exam

CISM Exam - Question 496


An intrusion has been detected and contained. Which of the following steps represents the BEST practice for ensuring the integrity of the recovered system?

Show Answer
Correct Answer: B

Restoring the operating system, patches, and application from the original source is the best practice to ensure the integrity of the recovered system after an intrusion. It guarantees that the system is rebuilt from the ground up using trusted sources, eliminating any potential remnants of the intrusion or vulnerabilities that may exist in backups or forensic copies.

Discussion

10 comments
Sign in to comment
jo_456Option: B
Dec 13, 2022

After compromise, always reimage

ZiggyboobooOption: C
Nov 19, 2022

C for me

aokisanOption: B
Dec 20, 2022

need to OS install. should not use backup because it may be intruded.

Souvik124Option: B
Feb 17, 2023

The BEST practice for ensuring the integrity of the recovered system after an intrusion has been detected and contained is to install the operating system (OS), patches, and applications from the original source (Option B).

welloOption: B
Jun 11, 2023

fresh install from the original source is the best way.

SaisharanOption: A
Jun 2, 2023

I will go with Option A

wello
Jun 11, 2023

Forensics copies are made after the intrusion as evidence of the attack for later investigation. If I restore it, then we have the same problem.

BennyMao
Sep 15, 2023

Agreed. What you say makes total sense.

richck102Option: B
Jun 28, 2023

B. Install the OS, patches, and application from the original source.

oluchecpointOption: A
Sep 7, 2023

A. Restore the application and data from a forensic copy. Restoring the system from a forensic copy ensures that you are using a known, clean, and unaltered version of the application and data. This is important because the original source (option B) and regular backups (option C) might also contain the same vulnerabilities or malware that allowed the intrusion in the first place. Option D, while important, is not sufficient on its own, as it may not guarantee the removal of all traces of the intrusion. Restoring from a forensic copy is a standard practice in digital forensics to ensure the integrity of the system and preserve evidence for further investigation if needed.

oluchecpoint
Sep 27, 2023

Changing my answer to OPTION A

oluchecpoint
Sep 27, 2023

OPTION B

ThaveeOption: C
Apr 11, 2024

Not a good question. The problems are 1. What has gone bad, Data or OS. 2. Restoring from backup, when was the backup. Was that a good backup? If the intrusion is indeed unknown the first date, reinstall the OS, reinstall the application, get the good known data from backup. I will stay with backup since the place I work does the hourly backup and disk dup.

03allenOption: A
Jun 7, 2024

awful question. ensuring the integrity of investigating or business operations?? Investigating is A, operations is B