question archive Question 1 (1 point)   ________________ is a strategic approach to prioritizing threats Question 1 options:   Risk management   Incident Response   Expert Investigation   Analysis and Reaction     Question 2 (1 point)     With regards to backups, CIRT should know ________________ Question 2 options:   Rotation and Sequencing of each backup   Location of the backup media   Methods of transporting the storage media to the alternate storage facility

Question 1 (1 point)   ________________ is a strategic approach to prioritizing threats Question 1 options:   Risk management   Incident Response   Expert Investigation   Analysis and Reaction     Question 2 (1 point)     With regards to backups, CIRT should know ________________ Question 2 options:   Rotation and Sequencing of each backup   Location of the backup media   Methods of transporting the storage media to the alternate storage facility

Subject:Computer SciencePrice: Bought3

Question 1 (1 point)

 

________________ is a strategic approach to prioritizing threats

Question 1 options:

 

Risk management

 

Incident Response

 

Expert Investigation

 

Analysis and Reaction


 

 

Question 2 (1 point)

 


 

With regards to backups, CIRT should know ________________

Question 2 options:

 

Rotation and Sequencing of each backup

 

Location of the backup media

 

Methods of transporting the storage media to the alternate storage facility.

 

All of the above


 

 

Question 3 (1 point)

 


 

If detection and monitoring is done offsite, CIRT must _____________________.

Question 3 options:

 

have a clear understanding of what that entails and what functions can be called upon during an investigation

 

be available to deploy to the offsite, if needed

 

visit the offsite and become experts in the software/hardware used

 

take any training allowed by the offsite vendor


 

 

Question 4 (1 point)

 


 

CIRT should be made aware of the following events except ______________.

Question 4 options:

 

installation of new equipment

 

New or modified applications

 

hiring of new IT personnel

 

infrastructure changes


 

 

Question 5 (1 point)

 

The ___________ should be the only executive authorized to allow systems to be returned to service.

Question 5 options:

 

CIO

 

CIRT manager

 

IT manager

 

CEO

 

Question 6 (1 point)

 

_______________ need additional security and training for each user.

Question 6 options:

 

Elevated privilege accounts (admins)

 

IT support staff

 

legal and HR

 

Managers

 

Question 7 (1 point)

 

____________ is information derived from digital devices to be presented in court.

Question 7 options:

 

Slack Space 

 

Digital evidence

 

Master file table

 

Cleanroom policy


 

 

Question 8 (1 point)

 

___________ describes the goal that organizations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws, policies, and regulations.

Question 8 options:

 

Cyber security

 

Engineered workloads

 

Memorandum of understanding

 

Regulatory compliance

 

Question 9 (1 point)

 

In a risk review, all assets must ________________.

Question 9 options:

 

be catalogued

 

insured

 

their value established

 

be in a protected space


 

 

Question 10 (1 point)

 

ISO is an ___________________.

Question 10 options:

 

international sales organization that drives security products into various marketplaces

 

internal cybersecurity accreditation organization with over 10,000 members

 

external facing forensics community for small and medium businesses

 

independent organization that brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standard

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions