Which of the following types of insider threats involves an insider who is uneducated on potential security threats or simply bypasses general security procedures to meet workplace efficiency?

Which of the following types of insider threats involves an insider who is uneducated on potential security threats or simply bypasses general security procedures to meet workplace efficiency?A . Professional insiderB . Malicious insiderC . Compromised insiderD . Negligent insiderView AnswerAnswer: D

June 24, 2022 No Comments READ MORE +

In which of the following stages of the incident handling and response (IH&R) process does Alice need to do a complete backup of the infected system?

Alice is an incident handler and she has been informed by her lead that the data on affected systems must be backed up so that it can be retrieved if it is damaged during the incident response process. She was also told that the system backup can also be used...

June 24, 2022 No Comments READ MORE +

Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud security incident. He is also analyzing the file systems, slack spaces, and metadata within the storage units to find hidden malware and evidence of malice.

Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud security incident. He is also analyzing the file systems, slack spaces, and metadata within the storage units to find hidden malware and evidence of malice. Identify the cloud security incident handled by Michael:A...

June 24, 2022 No Comments READ MORE +

Which of the following information security personnel handles incidents from management and technical point of view?

Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B

June 24, 2022 No Comments READ MORE +

Which of the following guidelines would help incident handlers eradicate insider at tacks by privileged users?

Eric works as a system administrator at ABC organization and previously granted several users with access privileges to the organizations systems with unlimited permissions. These privileged users could prospectively misuse their rights unintentionally, maliciously, or could be deceived by attackers that could trick them to perform malicious activities. Which of...

June 23, 2022 No Comments READ MORE +

How can you categorize this type of incident?

Sam, an employee from a multinational company, send se-mails to third-party organizations with a spoofed email address of his organization. How can you categorize this type of incident?A . Inappropriate usage incidentB . Network intrusion incidentC . Unauthorized access incidentD . Denial-of-service incidentView AnswerAnswer: A

June 23, 2022 No Comments READ MORE +

Which of the following information security personnel handles incidents from management and technical point of view?

Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B

June 22, 2022 No Comments READ MORE +

According to the scenario, which of the following stages of incident handling and response (IH&R) process did Robert perform?

Robert is an incident handler working for X security Inc. One day, his organization faced a massive cyberattack and all of the websites related to the organization went offline. Robert was on duty during the incident and he was responsible for handling the incident and maintaining business continuity. He immediately...

June 22, 2022 No Comments READ MORE +

Which of the following tools should Drake employ in order to view logs in real time and identify malware propagation within the network?

Drake is an incident handler at Dark Cloud Inc. Heist asked with performing log analysis in order to detect traces of malicious activities within the network infrastructure. Which of the following tools should Drake employ in order to view logs in real time and identify malware propagation within the network?A...

June 21, 2022 No Comments READ MORE +