Which of the following is NOT a symptom of virus hoax message?

A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?A . The message prompts the...

August 2, 2020 No Comments READ MORE +

How can you categorize this type of account?

ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?A . Inappropriate usage incidentB . Unauthorized access incidentC . Network intrusion incidentD . Denial of Service incidentView AnswerAnswer: A

August 1, 2020 No Comments READ MORE +

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.A . URL ManipulationB . XSS AttackC . SQL InjectionD . Denial of Service AttackView AnswerAnswer: D

August 1, 2020 No Comments READ MORE +

Which one of the following is the correct sequence of flow of the stages in an incident response:

Which one of the following is the correct sequence of flow of the stages in an incident response:A . Containment - Identification - Preparation - Recovery - Follow-up - EradicationB . Preparation - Identification - Containment - Eradication - Recovery - Follow-upC . Eradication - Containment - Identification - Preparation...

August 1, 2020 No Comments READ MORE +

Which stage of the incident response and handling process involves auditing the system and network log files?

An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves auditing the system and network log files?A . Incident recordingB . ReportingC . ContainmentD . IdentificationView AnswerAnswer: D

August 1, 2020 No Comments READ MORE +

How would you categorize such information security incident?

An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business continuity and market competitiveness. How would...

August 1, 2020 No Comments READ MORE +

Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism.

Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:A . Correlating known patterns of suspicious and malicious behaviorB . Protecting computer systems by implementing...

July 31, 2020 No Comments READ MORE +

Which of the following helps in recognizing and separating the infected hosts from the information system?

Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?A . Configuring firewall to default settingsB . Inspecting the process running on the systemC . Browsing particular government websitesD...

July 31, 2020 No Comments READ MORE +

A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines over the Internet.

A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect multiple systems which are known as:A . TrojansB . ZombiesC . SpywareD...

July 31, 2020 No Comments READ MORE +

Identify the virus type that specifically infects Microsoft Word files?

Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects Microsoft Word files?A . Micro VirusB . File InfectorC . Macro VirusD . Boot Sector virusView AnswerAnswer: C

July 30, 2020 No Comments READ MORE +