Learn why reliable and accessible data backups are essential for recovering from ransomware attacks. Explore the challenges and solutions for ensuring business continuity.
Table of Contents
Question
Which of the following presents the GREATEST challenge to the recovery of critical systems and data following a ransomware incident?
A. Unavailable or corrupt data backups
B. Ineffective alert configurations for backup operations
C. Lack of encryption for backup data in transit
D. Undefined or undocumented backup retention policies
Answer
A. Unavailable or corrupt data backups
Explanation
A. Unavailable or corrupt data backups presents the greatest challenge to recovery. Without reliable backups, restoring systems and data after a ransomware attack becomes significantly difficult, if not impossible.
Explanation of Incorrect Answers:
B. Ineffective alert configurations for backup operations: While alerting is crucial for monitoring backup health, it’s secondary to the availability and integrity of the backups themselves.
C. Lack of encryption for backup data in transit: Encryption in transit is important for security, but the primary concern during recovery is the availability and usability of backups.
D. Undefined or undocumented backup retention policies: While clear policies are important for data lifecycle management, the immediate challenge during recovery is the existence and quality of backups.
Isaca Certified Information Security Manager CISM certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the Isaca Certified Information Security Manager CISM exam and earn Isaca Certified Information Security Manager CISM certification.