nerdexam
IsacaIsaca

CISM · Question #262

CISM Question #262: Real Exam Question with Answer & Explanation

Sign in or unlock CISM to reveal the answer and full explanation for question #262. The question stem and answer options stay visible for context.

Submitted by manish99· Apr 18, 2026Information Security Incident Management

Question

Identifying which of the following BEST enables a cyberattack to be contained?

Options

  • AThe vulnerability exploited by the attack
  • BThe segment targeted by the attack
  • CThe IP address of the computer that launched the attack
  • DThe threat actor that initiated the attack

Unlock CISM to see the answer

You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#Incident Response#Cyberattack Containment#Vulnerability Management#Security Incident Handling
Full CISM PracticeBrowse All CISM Questions