Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?
Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?A . Scenario testingB . Facility testingC . Live walk-through testingD . Procedure testingView AnswerAnswer: D
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.
Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.A . URL ManipulationB . XSS AttackC . SQL InjectionD . Denial of Service AttackView AnswerAnswer: D
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and technical limitations that adversely affects the organization’s operation and revenues?
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and technical limitations that adversely affects the organization’s operation and revenues?A . RiskB . VulnerabilityC . ThreatD . Incident ResponseView AnswerAnswer: A
Which of the following information security personnel handles incidents from management and technical point of view?
Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Forensic investigatorsC . Inc dent manager(IM)D . Threat researchersView AnswerAnswer: C
The flow chart gives a view of different roles played by the different personnel of CSIRT.
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.A . A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident ManagerB . A- Incident...
Which service listed below, if blocked, can help in preventing Denial of Service attack?
The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed below, if blocked, can help in preventing Denial of Service attack?A . SAM serviceB . POP3 serviceC . SMTP serviceD . Echo serviceView AnswerAnswer:...
According to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According to CERT’s incident management process, which stage focuses on implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?A . ProtectionB . PreparationC...
Identify the stage of the incident response and handling process in which complete backup of the infected system is carried out?
The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response and handling process in which complete backup...
from the memory dump?
John is performing a memory dump analysis in order to find traces of malware. He has employed Volatility tool in order to achieve his objective. Which of the following volatility framework command she will use in order to analyze the running process from the memory dump?A . python vol.py pslist--profile=Win2008SP1x86...
Joseph is an incident handling and response(IH&R) team lead in Toro Network Solutions Company. As a part of the IH&R process, Joseph alerted the service providers, developers, and manufacturers about the affected resources.
Joseph is an incident handling and response(IH&R) team lead in Toro Network Solutions Company. As a part of the IH&R process, Joseph alerted the service providers, developers, and manufacturers about the affected resources. Identify the stage of IH&R process Joseph is currently in.A . EradicationB . RecoveryC . ContainmentD ....