Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the risk associated with an IT system through its SDLC. How many primary steps does NIST"™s risk assessment methodology involve?
Answer : D
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:
Answer : A
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation, recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
Answer : A
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
Answer : D
Which policy recommends controls for securing and tracking organizational resources:
Answer : D
Which one of the following is the correct sequence of flow of the stages in an incident response:
Answer : B
Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally attacked the computer system. EVIDENCE PROTECTION is also required to meet legal compliance issues. Which of the following documents helps in protecting evidence from physical or logical damage:
Answer : B
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of an IRT?
Answer : B
The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup of the infected system is carried out?
Answer : A
In a qualitative risk analysis, risk is calculated in terms of:
Answer : C
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?
Answer : A
In which of the steps of NIST"™s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?
Answer : C
ADAM, an employee from a multinational company, uses his company"™s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this type of account?
Answer : A
A security policy will take the form of a document or a collection of documents, depending on the situation or usage. It can become a point of reference in case a violation occurs that results in dismissal or other penalty. Which of the following is NOT true for a good security policy?
Answer : B
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us