IsacaIsaca
CISM · Question #262
CISM Question #262: Real Exam Question with Answer & Explanation
Sign in or unlock CISM to reveal the answer and full explanation for question #262. The question stem and answer options stay visible for context.
Submitted by manish99· Apr 18, 2026Information Security Incident Management
Question
Identifying which of the following BEST enables a cyberattack to be contained?
Options
- AThe vulnerability exploited by the attack
- BThe segment targeted by the attack
- CThe IP address of the computer that launched the attack
- DThe threat actor that initiated the attack
Unlock CISM to see the answer
You've previewed enough free CISM questions. Unlock CISM for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#Incident Response#Cyberattack Containment#Vulnerability Management#Security Incident Handling