Suspicious activity is observed on a machine that processes financial transactions. Which plan highlights an effective response approach based on its operational importance?
Assess whether escalation is needed based on the system’s financial role and the nature of the suspicious activity
Address the activity following standard operating procedures unless further analysis indicates a critical threat
Consider the incident’s impact and determine whether a lower-priority response is appropriate
Conduct a detailed review of system logs to assess the scope of response measures
A machine devoted to financial transactions involves heightened sensitivity. Evaluating whether escalation is warranted helps ensure potential risks are not overlooked. The second choice suggests a detailed review but does not address escalating where needed. The third and fourth options de-emphasize the risk by considering reduced or standard approaches without factoring in the potential severity.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
Why is escalation so important when handling systems that process financial transactions?
Open an interactive chat with Bash
What is the role of system logs in investigating suspicious activity?
Open an interactive chat with Bash
What are standard operating procedures (SOPs), and why might they be insufficient here?