ハッカーがドメインコントローラーのよく知られた脆弱性を悪用したセキュリティ違反に続いて、IS監査が統制評価を実施するように依頼されました。監査人の最善の行動方針は、次のことを判断することです。
正解:B
Explanation
The auditor's best course of action after a security breach in which a hacker exploited a well-known vulnerability in the domain controller is to determine if the logs were monitored. Log monitoring is an essential control for detecting and responding to security incidents, especially when known vulnerabilities exist in the system. The auditor should assess if the logs were properly configured, collected, reviewed, analyzed, and acted upon by the responsible parties. Updating patches, monitoring network traffic, and classifying domain controllers for high availability are also important controls, but they are not directly related to the detection and response of the security breach. References:
CISA Review Manual (Digital Version), page 301
CISA Questions, Answers & Explanations Database, question ID 3340