Which of the following information security personnel handles incidents from management and technical point of view?

Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B

June 18, 2022 No Comments READ MORE +

Which of the following information security personnel handles incidents from management and technical point of view?

Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Incident manager (IM)C . Forensic investigatorsD . Threat researchersView AnswerAnswer: B

June 17, 2022 No Comments READ MORE +

James has been appointed as an incident handing and response (IH&R) team lead and was assigned to build an IH&R plan and his own team in the company. Identify the IH&R process step James is currently working on.

James has been appointed as an incident handing and response (IH&R) team lead and was assigned to build an IH&R plan and his own team in the company. Identify the IH&R process step James is currently working on.A . EradicationB . NotificationC . PreparationD . RecoveryView AnswerAnswer: C

June 17, 2022 No Comments READ MORE +

Which of the following is not the responsibility of first responders?

Which of the following is not the responsibility of first responders?A . Packaging and transporting the electronic evidenceB . Protecting the crime sceneC . Preserving temporary and fragile evidence and then shutdown or reboot the victim's computerD . Identifying the crime sceneView AnswerAnswer: C

June 17, 2022 No Comments READ MORE +

Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system.

Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system. Identify the data acquisition method Marley must employ to collect volatile data.A . Live data acquisitionB ....

June 17, 2022 No Comments READ MORE +

Which of the following W re shark filters would Bran use to accomplish this task?

Bran is an incident handler who is assessing the network of the organization. He wants to detect ping sweep attempts on the network using Wire shark. Which of the following W re shark filters would Bran use to accomplish this task?A . icmp.type== 8B . icmp.redir_gwC . icmp.identD . icmp.seqView...

June 16, 2022 No Comments READ MORE +

Which of the following information security incidents did the Delmont organization face?

Otis is an incident handler working in the Delmont organization. Recently, the organization is facing several setbacks in the business and thereby its revenues are going down. Otis was asked to take charge and look into the matter. While auditing the enterprise security, he found the traces of an attack...

June 16, 2022 No Comments READ MORE +

Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems.

Andrew, an incident responder, is performing risk assessment of the client organization. As a part of the risk assessment process, he identified the boundaries of the IT systems, along with the resources and the information that constitute the systems. Identify the risk assessment step Andrew is performing.A . Likelihood determinationB...

June 16, 2022 No Comments READ MORE +