ハッカーがドメイン コントローラのよく知られた脆弱性を悪用したセキュリティ侵害が発生した後、IS 監査に制御評価の実施が求められました。監査人の最善の行動は、次の事項を判断することです。
正解:B
The auditor's best course of action after a security breach in which a hacker exploited a well-known vulnerability in the domain controller is to determine if the logs were monitored. Log monitoring is an essential control for detecting and responding to security incidents, especially when known vulnerabilities exist in the system. The auditor should assess if the logs were properly configured, collected, reviewed, analyzed, and acted upon by the responsible parties. Updating patches, monitoring network traffic, and classifying domain controllers for high availability are also important controls, but they are not directly related to the detection and response of the security breach. References:
* CISA Review Manual (Digital Version), page 301
* CISA Questions, Answers & Explanations Database, question ID 3340