According to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?

One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?A . ProtectionB . PreparationC...

August 4, 2020 No Comments READ MORE +

Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?

Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?A . Evidence SupervisorB . Evidence DocumenterC . Evidence ManagerD . Evidence Examiner/...

August 3, 2020 No Comments READ MORE +

A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source.

A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are defined: A . Identification VulnerabilitiesB . Control analysisC . Threat identificationD . System characterizationView AnswerAnswer: C

August 3, 2020 No Comments READ MORE +

Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of their constituency?

The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of their constituency?A . Full-level authorityB . Mid-level authorityC . Half-level authorityD ....

August 3, 2020 No Comments READ MORE +

Which of the following policies authorizes a group of users to perform a set of actions on a set of resources?

Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies authorizes a group of users to perform a set of actions on a set of resources?A . Access control policyB . Audit trail policyC . Logging policyD...

August 2, 2020 No Comments READ MORE +

Which of the following is NOT a symptom of virus hoax message?

A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?A . The message prompts the...

August 2, 2020 No Comments READ MORE +

How can you categorize this type of account?

ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?A . Inappropriate usage incidentB . Unauthorized access incidentC . Network intrusion incidentD . Denial of Service incidentView AnswerAnswer: A

August 1, 2020 No Comments READ MORE +

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.A . URL ManipulationB . XSS AttackC . SQL InjectionD . Denial of Service AttackView AnswerAnswer: D

August 1, 2020 No Comments READ MORE +

Which one of the following is the correct sequence of flow of the stages in an incident response:

Which one of the following is the correct sequence of flow of the stages in an incident response:A . Containment - Identification - Preparation - Recovery - Follow-up - EradicationB . Preparation - Identification - Containment - Eradication - Recovery - Follow-upC . Eradication - Containment - Identification - Preparation...

August 1, 2020 No Comments READ MORE +

Which stage of the incident response and handling process involves auditing the system and network log files?

An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves auditing the system and network log files?A . Incident recordingB . ReportingC . ContainmentD . IdentificationView AnswerAnswer: D

August 1, 2020 No Comments READ MORE +