iSACA Cybersecurity Fundamentals Certification Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Study for the iSACA Cybersecurity Fundamentals Certification Exam. Prepare with flashcards and multiple choice questions. Each question offers hints and explanations. Get exam ready!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is a potential challenge during cybersecurity incident investigations?

  1. Ensuring all users are aware of security policies

  2. Conflicting goals between investigation and incident response

  3. Balancing system performance with security measures

  4. Assessing regulatory compliance

The correct answer is: Conflicting goals between investigation and incident response

During cybersecurity incident investigations, one significant challenge arises from the conflicting goals between the investigation process and the incident response efforts. When an organization faces a cybersecurity incident, the primary objective is often to restore normal operations and mitigate the immediate threat. However, this reactive focus can sometimes clash with the need for thorough investigation, which requires preservation of evidence, detailed analysis, and potentially longer timelines. For instance, while incident response teams might prioritize system recovery and user communication to minimize impact, investigators may need to forensically analyze affected systems without rushing to restore services. This can lead to tension between teams, as emergency actions taken during incident response could compromise potential evidence, such as logs or compromised systems that are crucial for understanding the nature of the attack and preventing future incidents. The other options, while relevant to cybersecurity practices, do not represent the specific challenges that emerge during the complexities of an investigation. Awareness of security policies is foundational to a secure environment but does not pertain directly to conflicts during an investigation. Similarly, balancing system performance with security measures is an ongoing consideration in cybersecurity management but does not specifically address the interplay of objectives during an incident investigation. Lastly, assessing regulatory compliance is a crucial aspect of cybersecurity strategy; however, it is a broader concern that does not reflect