In the above scenario, which of the following ticketing systems can be employed by the Dolphin Investment firm to allow Jacob to raise the issue in order to tell the respective team about the incident?
Jacobi san employee in Dolphin Investment firm. While he was on his duty, he identified that his computer is facing some problems and he wanted to convey the issue to the respective authority in his organization. But currently this organization does not have a ticketing system to address such types...
Which of the following email security tools can be used by an incident handler to prevent the organization against evolving email threats?
Which of the following email security tools can be used by an incident handler to prevent the organization against evolving email threats?A . Mx ToolboxB . G Suite ToolboxC . Email Header AnalyzerD . Gpg4winView AnswerAnswer: D
Which of the following volatility framework command she will use in order to analyze the running process from the memory dump?
John is performing a memory dump analysis in order to find traces of malware. He has employed Volatility tool in order to achieve his objective. Which of the following volatility framework command she will use in order to analyze the running process from the memory dump?A . python vol.py hivelist-prof...
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system.
Marley was asked by his incident handing and response (IH&R) team lead to collect volatile data such as system information and network information present in the registries, cache, and RAM of victim's system. Identify the data acquisition method Marley must employ to collect volatile data.A . Live data acquisitionB ....
identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a high volume of traffic that consumes all existing network resources.
identify the network security incident where intended or authorized users are prevented from using system, network, or applications by flooding the network with a high volume of traffic that consumes all existing network resources.A . SQL injectionB . URL manipulationC . XSS attackD . Denial-of-serviceView AnswerAnswer: D
Which of the following is NOT a symptom of virus hoax message?
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus hoax message?A . The message prompts the...
What is the main purpose of the reconstitution plan?
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific requirements that the planning should address. There are five major components of the IT contingency plan, namely supporting information, notification activation, recovery and reconstitution and plan appendices. What is the...
Which one of the following is the correct sequence of flow of the stages in an incident response:
Which one of the following is the correct sequence of flow of the stages in an incident response:A . Containment - Identification - Preparation - Recovery - Follow-up - EradicationB . Preparation - Identification - Containment - Eradication - Recovery - Follow-upC . Eradication - Containment - Identification - Preparation...
Elizabeth, working for OBC organization as an incident responder, is assessing the risks facing the organizational security. During the assessment process, she calculates the probability of a threat source exploiting an existing system vulnerability.
Elizabeth, working for OBC organization as an incident responder, is assessing the risks facing the organizational security. During the assessment process, she calculates the probability of a threat source exploiting an existing system vulnerability. Identify the risk assessment step Elizabeth is currently in.A . System characterizationB . Impact analysisC ....
Which incident category of the US Federal Agency does this incident belong to?
A US Federal agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency’s reporting timeframe guidelines, this incident should be reported within two (2) HOURS of discovery/detection if the successful attack is still ongoing and the agency...