Domain 4 – Section B Review: Incident Management Operations
This section integrates:
- Tools and Techniques
- Investigation and Evaluation
- Containment
- Communications
- Eradication and Recovery
- Post-Incident Review
CISM evaluates whether you can manage incidents in a structured, legally defensible, and business-aligned manner.
Section B Review
1. Tools Support Governance
Incident tools must:
- Align with risk profile
- Be integrated and manageable
- Preserve evidence
- Support centralized documentation
- Enable structured escalation
Tools do not replace process.
2. Investigation Determines Truth
Investigation must:
- Define scope
- Preserve evidence
- Identify root cause
- Assess business impact
- Document findings
Containment without investigation creates recurrence risk.
3. Containment Must Be Proportional
Containment should:
- Limit damage quickly
- Protect critical assets
- Preserve evidence
- Reflect severity classification
- Consider business impact
Overreaction can create greater operational harm.
4. Communication Must Be Structured
Incident communications must:
- Follow escalation tiers
- Involve legal where required
- Meet regulatory deadlines
- Be centrally controlled
- Be documented
Informal communication creates liability.
5. Eradication and Recovery Require Validation
Recovery must:
- Address root cause
- Align with BIA-defined priorities
- Validate system integrity
- Increase monitoring temporarily
- Confirm control effectiveness
Restoration is not closure.
6. Post-Incident Review Closes the Loop
Every incident should:
- Confirm root cause
- Evaluate response effectiveness
- Identify control gaps
- Assign remediation
- Update policies and procedures
Improvement defines maturity.
Section B – Practice Questions
Question 1
During containment, affected systems are wiped before evidence collection.
What is the PRIMARY risk?
- Encryption weakness
- Vendor inefficiency
- Loss of legal defensibility
- Reduced automation
Answer & Explanation
Correct Answer: C
Evidence must be preserved before remediation.
Question 2
A breach is detected but not entered into the incident management system.
What is the MOST significant issue?
- Breakdown in documentation and governance tracking
- Encryption gap
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: A
All incidents must be formally documented.
Question 3
A severe incident is not escalated because investigation is incomplete.
What is the PRIMARY governance failure?
- Encryption deficiency
- Reduced automation
- Vendor oversight
- Failure to follow predefined escalation criteria
Answer & Explanation
Correct Answer: D
Escalation should follow severity thresholds, not investigation completion.
Question 4
Systems are restored without resetting compromised credentials.
What is the MOST significant risk?
- Encryption gap
- Continued unauthorized access
- Vendor inefficiency
- Reduced automation
Answer & Explanation
Correct Answer: B
Credential reset is essential during eradication.
Question 5
An organization deploys new tools during an active incident without training staff.
What is the PRIMARY weakness?
- Reduced automation
- Encryption gap
- Tool deployment without operational readiness
- Vendor inefficiency
Answer & Explanation
Correct Answer: C
Tools must align with capability maturity.
Question 6
After containment, root cause analysis is not performed.
What is the PRIMARY risk?
- Incident recurrence due to unresolved vulnerability
- Encryption weakness
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: A
Root cause must be addressed to prevent recurrence.
Question 7
Regulatory notification deadlines are missed due to delayed communication.
What is the MOST significant governance breakdown?
- Encryption deficiency
- Reduced automation
- Vendor oversight
- Failure to follow communication escalation procedures
Answer & Explanation
Correct Answer: D
Timely communication is mandatory for compliance.
Question 8
Post-incident findings identify ineffective monitoring, but no changes are implemented.
What is the PRIMARY weakness?
- Encryption gap
- Failure to integrate lessons learned into program improvement
- Vendor inefficiency
- Monitoring delay
Answer & Explanation
Correct Answer: B
Governance maturity requires improvement tracking.
Question 9
Containment actions significantly disrupt critical business operations.
What principle was MOST likely ignored?
- Automation discipline
- Vendor governance
- Proportional containment aligned with business impact
- Monitoring frequency
Answer & Explanation
Correct Answer: C
Containment must balance urgency with operational impact.
Question 10
After recovery, increased monitoring is not implemented.
What is the PRIMARY risk?
- Failure to validate eradication success
- Encryption deficiency
- Vendor oversight
- Reduced automation
Answer & Explanation
Correct Answer: A
Post-recovery monitoring confirms successful remediation.
Section B Pattern Summary
In Domain 4 Section B:
- Tools enable structured response.
- Investigation determines scope and impact.
- Containment must be proportional.
- Communication must follow escalation rules.
- Eradication must address root cause.
- Recovery must be validated.
- Post-incident review drives improvement.
CISM rewards disciplined execution — not reactive urgency.