IsacaIsaca
CISM · Question #155
CISM Question #155: Real Exam Question with Answer & Explanation
Sign in or unlock CISM to reveal the answer and full explanation for question #155. The question stem and answer options stay visible for context.
Submitted by paula_co· Apr 18, 2026Information Security Incident Management
Question
During incident recovery, which of the following is the BEST approach to ensure the eradication of traces hidden by an attacker?
Options
- AReinstall the system from the original source.
- BPerform continuous monitoring until validation is achieved.
- CProhibit use of the account suspected to be compromised.
- DConduct a forensic investigation to acquire evidence.
Unlock CISM to see the answer
You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Incident Eradication#System Recovery#Incident Response Best Practices