What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?

What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and recover from malicious computer incidents such as a denial-of-service attack?A . Disaster Recovery PlanB . Emergency Analysis PlanC . Crisis Communication PlanD . Incident Response PlanView AnswerAnswer: D Explanation: Reference: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-61r2.pdf

June 12, 2019 No Comments READ MORE +

What must be included in the CMDB?

What must be included in the CMDB?A . Inventory of uninstalled softwareB . Software End User Licensing AgreementsC . Dependencies of installed componentsD . Known vulnerabilities of installed softwareView AnswerAnswer: C Explanation: Reference: https://docs.servicenow.com/bundle/london-servicenow-platform/page/product/configuration­management/concept/cnfig-mgmt-and-cmdb.html

June 9, 2019 No Comments READ MORE +

Based on the IRP, what should be done immediately?

Your firewall blocked several machines on your network from connecting to a malicious IP address. After reviewing the logs, the CSIRT discovers all Microsoft Windows machines on the network have been affected based on a newly published CVE. Based on the IRP, what should be done immediately?A . Update the...

June 7, 2019 No Comments READ MORE +

This action is being executed in which function?

The CSIRT team is following the existing recovery plans on non-production systems in a PRE-BREACH scenario. This action is being executed in which function?A . ProtectB . RecoverC . IdentifyD . RespondView AnswerAnswer: A

June 6, 2019 No Comments READ MORE +

Which document provides an implementation plan to recover business functions and processes during and after an event?

Which document provides an implementation plan to recover business functions and processes during and after an event?A . Business Continuity PlanB . Disaster Recovery PlanC . Risk Assessment StrategyD . Business Impact AnalysisView AnswerAnswer: B Explanation: Reference: https://www.bmc.com/blogs/disaster-recovery-planning/

June 4, 2019 No Comments READ MORE +

In which function is the SDLC implemented?

In which function is the SDLC implemented?A . RespondB . ProtectC . DetectD . RecoverView AnswerAnswer: A

May 31, 2019 No Comments READ MORE +

What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?

What process is used to identify an organization’s physical, digital, and human resource, as required in their Business Impact Analysis?A . Risk Management StrategyB . Risk AssessmentC . Risk TreatmentD . Asset InventoryView AnswerAnswer: D

May 30, 2019 No Comments READ MORE +

Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact

DRAG DROP Rank order the relative severity of impact to an organization of each plan, where “1” signifies the most impact and “4” signifies the least impact. View AnswerAnswer:

May 30, 2019 No Comments READ MORE +

What is a consideration when performing data collection in Information Security Continuous Monitoring?

What is a consideration when performing data collection in Information Security Continuous Monitoring?A . Data collection efficiency is increased through automation.B . The more data collected, the better chances to catch an anomaly.C . Collection is used only for compliance requirements.D . Data is best captured as it traverses the...

May 30, 2019 No Comments READ MORE +

What is the main goal of a gap analysis in the Identify function?

What is the main goal of a gap analysis in the Identify function?A . Determine security controls to improve security measuresB . Determine actions required to get from the current profile state to the target profile stateC . Identify gaps between Cybersecurity Framework and Cyber Resilient Lifecycle pertaining to that...

May 29, 2019 No Comments READ MORE +