SSCP Exam QuestionsBrowse all questions from this exam

SSCP Exam - Question 129


When a possible intrusion into your organization's information system has been detected, which of the following actions should be performed first?

Show Answer
Correct Answer: B

When a possible intrusion into an organization's information system is detected, the first action that should be performed is to contain the intrusion. Containing the threat prevents the intruder from further accessing or damaging the system, limits the scope of the breach, and protects data and resources. Once the intrusion is contained, further actions can be taken to determine the extent of the compromise and remediate the system.

Discussion

4 comments
Sign in to comment
newpylong
Jan 30, 2023

B is correct. Why would you look to see what operations have been impacted if the threat is still ongoing?

Jimmystra
Feb 22, 2023

That's what I thought too, but in order to contain the threat, you must know what parts have been compromised/impacted.

wico
Mar 26, 2023

Idk, I am with Newpylong on this one. Everything I have ever seen in security was prioritizing B.

catastrophie
Apr 13, 2023

The given answer C would be correct. Think about this from a logical standpoint step by step. 1. IDS goes off and says there is a possible intrusion. -- ok great, could be a real threat or could be a false positive, right? -- So you chose B. What system are you going to contain a potential intrusion to? -- Ok so lets say you chose to take "System A" offline. -- What if thats not the point of entry and not the only system compromised? -- What is someone has persistent access via a network router and continuing to push malicious code to other systems? Logically you need to follow: 1. IDS alarm 2. Determine if its actually an issue and to what extent. If its an actual intrution and not just a "possible" then continue on. 3. Attempt to contain and cut off access if needed or possible. Sometimes you have no clue where access could be originating from. Email link clicked so no web attack? Removable media? Through ISP network? Long story short, you need to ensure the potential threat and intrusion is real and assess the situation before shutting systems down all willy nilly.

kmanb
Jul 19, 2023

You're not understand the question. I mentions that "When a possible intrusion into your organization's information system has been detected". So an potential intrusion has been detect. You need to contain it first. B is right

swiggharo
Jul 15, 2024

Contain what? The whole system? Yes, you have to contain it first, but you got to find out which systems are affected first in order to contain it.

Aliyan
Sep 21, 2024

contain the whole segment

Aliyan
Sep 21, 2024

contain the whole segment

swiggharo
Jul 15, 2024

Contain what? The whole system? Yes, you have to contain it first, but you got to find out which systems are affected first in order to contain it.

Aliyan
Sep 21, 2024

contain the whole segment

Aliyan
Sep 21, 2024

contain the whole segment

kmanb
Jul 19, 2023

You're not understand the question. I mentions that "When a possible intrusion into your organization's information system has been detected". So an potential intrusion has been detect. You need to contain it first. B is right

swiggharo
Jul 15, 2024

Contain what? The whole system? Yes, you have to contain it first, but you got to find out which systems are affected first in order to contain it.

Aliyan
Sep 21, 2024

contain the whole segment

Aliyan
Sep 21, 2024

contain the whole segment

swiggharo
Jul 15, 2024

Contain what? The whole system? Yes, you have to contain it first, but you got to find out which systems are affected first in order to contain it.

Aliyan
Sep 21, 2024

contain the whole segment

Aliyan
Sep 21, 2024

contain the whole segment

mejt
Aug 11, 2023

I think C is correct. We cannot contain the intrusion if we do not know the extent of it.

Stevovo123Option: B
Apr 24, 2024

When a possible intrusion into your organization's information system has been detected, the first action that should be performed is to contain the intrusion. Containment aims to prevent the intruder from further accessing or damaging your system, limiting the scope of the breach, and protecting your data and resources.

e098e9cOption: C
Oct 9, 2024

First glance, I see B except the question mentions "First" which suggests you must identify the issue. C is more closely aligned with identify, and the NEXT step after you know the issue is to contain it (B). Hope this helps clear things up!