Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?
Answer : D
Which of the following defines the communication link between a Web server and Web applications?
Answer : D
Which of the following plans is documented and organized for emergency response, backup operations, and recovery maintained by an activity as part of its security program that will ensure the availability of critical resources and facilitates the continuity of operations in an emergency situation?
Answer : D
Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions?
Each correct answer represents a complete solution. Choose all that apply.
Answer : BC
Which of the following methods is a means of ensuring that system changes are approved before being implemented, and the implementation is complete and accurate?
Answer : D
Which of the following roles is responsible for review and risk analysis of all contracts on a regular basis?
Answer : C
Which of the following statements about a certification authority (CA) is true?
Answer : C
BS 7799 is an internationally recognized ISM standard that provides high level, conceptual recommendations on enterprise security. BS 7799 is basically divided into three parts.
Which of the following statements are true about BS 7799?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ABC
An organization monitors the hard disks of its employees' computers from time to time.
Which policy does this pertain to?
Answer : C
Which of the following disaster recovery tests includes the operations that shut down at the primary site, and are shifted to the recovery site according to the disaster recovery plan?
Answer : C
Fill in the blank with the appropriate phrase.
____________ privilege escalation is the process of attempting to access sources with a higher access, such as a user account trying to access admin privileges.
Answer : A
Choose the steps involved in the general disaster recovery procedure.
Answer : A
Which of the following backup sites is the best way for rapid recovery if you do not need the full recovery temporarily?
Answer : C
Which of the following subphases are defined in the maintenance phase of the life cycle models?
Each correct answer represents a part of the solution. Choose all that apply.
Answer : ABC
Fill in the blank:
An ___________________ (AS) is a group of networks under a single administration and with single routing policies.
Answer : A
Have any questions or issues ? Please dont hesitate to contact us