Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?

Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?A . Evidence SupervisorB . Evidence DocumenterC . Evidence ManagerD . Evidence Examiner/...

March 21, 2022 No Comments READ MORE +

Which of the following tools would help the organization to secure cloud resources and services?

An organization named Sam Morison Inc.decided to use cloud-based services to reduce the cost of their maintenance. They first identified various risks and threats associated with cloud service adoption and migrating critical business data to third-party systems. Hence, the organization decided to deploy cloud-based security tools to prevent upcoming threats....

March 21, 2022 No Comments READ MORE +

In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?

In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the system identified?A . Likelihood DeterminationB . Control recommendationC . System characterizationD . Control analysisView AnswerAnswer: C

March 21, 2022 No Comments READ MORE +

Which among the following is the role played by the Incident Coordinator of an IRT?

Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of an IRT?A . Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as...

March 21, 2022 No Comments READ MORE +

The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:

The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:A . If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.B . If the insider’s technical literacy and process...

March 20, 2022 No Comments READ MORE +

Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?

Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle such situations?A . Scenario testingB . Facility testingC . Live walk-through testingD . Procedure testingView AnswerAnswer: D

March 20, 2022 No Comments READ MORE +

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.

Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing network resources.A . URL ManipulationB . XSS AttackC . SQL InjectionD . Denial of Service AttackView AnswerAnswer: D

March 19, 2022 No Comments READ MORE +

Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and technical limitations that adversely affects the organization’s operation and revenues?

Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and technical limitations that adversely affects the organization’s operation and revenues?A . RiskB . VulnerabilityC . ThreatD . Incident ResponseView AnswerAnswer: A

March 19, 2022 No Comments READ MORE +

Which of the following information security personnel handles incidents from management and technical point of view?

Which of the following information security personnel handles incidents from management and technical point of view?A . Network administratorsB . Forensic investigatorsC . Inc dent manager(IM)D . Threat researchersView AnswerAnswer: C

March 18, 2022 No Comments READ MORE +

The flow chart gives a view of different roles played by the different personnel of CSIRT.

The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.A . A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident ManagerB . A- Incident...

March 18, 2022 No Comments READ MORE +