How would you categorize such information security incident?

An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The organization’s incident response manager, upon investigation, found that the incident must be handled within a few hours on the same day to maintain business continuity and market competitiveness. How would...

August 1, 2020 No Comments READ MORE +

Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism.

Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in detecting insider threats:A . Correlating known patterns of suspicious and malicious behaviorB . Protecting computer systems by implementing...

July 31, 2020 No Comments READ MORE +

Which of the following helps in recognizing and separating the infected hosts from the information system?

Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the information system?A . Configuring firewall to default settingsB . Inspecting the process running on the systemC . Browsing particular government websitesD...

July 31, 2020 No Comments READ MORE +

A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines over the Internet.

A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect multiple systems which are known as:A . TrojansB . ZombiesC . SpywareD...

July 31, 2020 No Comments READ MORE +

Identify the virus type that specifically infects Microsoft Word files?

Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects Microsoft Word files?A . Micro VirusB . File InfectorC . Macro VirusD . Boot Sector virusView AnswerAnswer: C

July 30, 2020 No Comments READ MORE +