Academy Login

Weekly CISSP Practice

Exam Questions

Week 6 - Question 1

Question:  After a security breach, management wants a full report. Which is the least relevant information for them?

A. How the breach occurred

B. The type of data accessed

C. The patches missed in the last update

D. Next steps and recommendations

Correct Answer: C

Explanation: 

A. How the Breach Occurred
Understanding the "How" is essential for identifying the root cause of the incident. Management needs this high-level context to understand if the breach was due to a process failure, a human error, or a sophisticated external attack.

Strategic Value: This information justifies the budget for new security controls. For example, if the breach occurred via phishing, management needs to know so they can approve additional security awareness training or multi-factor authentication (MFA) rollouts.

B. The Type of Data Accessed
This is often the most critical piece of information for the "C-Suite" (CEO, CIO, Legal Counsel).

Impact Assessment: The type of data dictates the organization's legal and regulatory response. If PII (Personally Identifiable Information) or PHI (Protected Health Information) was accessed, the organization may be legally required to notify the government and affected individuals within a strict timeframe (e.g., under GDPR or HIPAA).

Business Continuity: Knowing if trade secrets or intellectual property were stolen helps management assess the long-term competitive damage to the firm and potential loss of market share.

C. The Patches Missed in the Last Update
While this detail is vital for the IT Operations and Security Engineering teams to prevent a recurrence, it is too granular for a management-level report.

The "Forest vs. Trees" Problem: Management looks at the "Forest" (the overall security posture and risk). A list of specific CVE numbers or missing patch IDs represents "The Trees."

Why it's the Answer: In the context of the CISSP exam, always choose the answer that distinguishes between operational/tactical tasks (patching) and strategic/governance tasks (impact and recommendations). Management cares that the vulnerability was patched, but they don't necessarily need the itemized list of what was missed during the last maintenance window.

D. Next Steps and Recommendations
Management’s primary role is decision-making and resource allocation. They need to know the roadmap for recovery and how to prevent a "Round 2."

Actionable Intelligence: This section of the report should include the estimated cost of remediation, changes to security policy, and any necessary investments in new technology. It moves the conversation from "What happened?" to "How do we fix it and move forward?"

Key Takeaway for the CISSP Exam
Governance Insight: When reporting to management, always prioritize Business Impact (Money, Reputation, Legal) and Risk Mitigation. Technical logs, patch lists, and specific configurations belong in the technical "Post-Incident Review" for the practitioners, not the summary for the executives.

Podcasts

Check out my weekly podcasts that delve deep into the relevant topics related to each of CISSP domains. In addition, I will go over specific questions and they can be interpreted and answered.

Listen Podcasts

CISSP Cyber Training Academy

Tired of not knowing how to study for the CISSP Exam? 

Check out the CISSP Cyber Training Academy to help you on your journey!

Learn about the Academy!

CISSP Cyber Training - YouTube

Check out my video collection on YouTube discussing all the details needed to help you pass the CISSP exam.   

Check out channel