question archive Question 1 (1 point) ________________ is a strategic approach to prioritizing threats Question 1 options: Risk management Incident Response Expert Investigation Analysis and Reaction Question 2 (1 point) With regards to backups, CIRT should know ________________ Question 2 options: Rotation and Sequencing of each backup Location of the backup media Methods of transporting the storage media to the alternate storage facility
Subject:Computer SciencePrice: Bought3
Question 1 (1 point)
________________ is a strategic approach to prioritizing threats
Question 1 options:
Risk management |
|
Incident Response |
|
Expert Investigation |
|
Analysis and Reaction
|
Question 2 (1 point)
With regards to backups, CIRT should know ________________
Question 2 options:
Rotation and Sequencing of each backup |
|
Location of the backup media |
|
Methods of transporting the storage media to the alternate storage facility. |
|
All of the above
|
Question 3 (1 point)
If detection and monitoring is done offsite, CIRT must _____________________.
Question 3 options:
have a clear understanding of what that entails and what functions can be called upon during an investigation |
|
be available to deploy to the offsite, if needed |
|
visit the offsite and become experts in the software/hardware used |
|
take any training allowed by the offsite vendor
|
Question 4 (1 point)
CIRT should be made aware of the following events except ______________.
Question 4 options:
installation of new equipment |
|
New or modified applications |
|
hiring of new IT personnel |
|
infrastructure changes
|
Question 5 (1 point)
The ___________ should be the only executive authorized to allow systems to be returned to service.
Question 5 options:
CIO |
|
CIRT manager |
|
IT manager |
|
CEO |
Question 6 (1 point)
_______________ need additional security and training for each user.
Question 6 options:
Elevated privilege accounts (admins) |
|
IT support staff |
|
legal and HR |
|
Managers |
Question 7 (1 point)
____________ is information derived from digital devices to be presented in court.
Question 7 options:
Slack Space |
|
Digital evidence |
|
Master file table |
|
Cleanroom policy
|
Question 8 (1 point)
___________ describes the goal that organizations aspire to achieve in their efforts to ensure that they are aware of and take steps to comply with relevant laws, policies, and regulations.
Question 8 options:
Cyber security |
|
Engineered workloads |
|
Memorandum of understanding |
|
Regulatory compliance |
Question 9 (1 point)
In a risk review, all assets must ________________.
Question 9 options:
be catalogued |
|
insured |
|
their value established |
|
be in a protected space
|
Question 10 (1 point)
ISO is an ___________________.
Question 10 options:
international sales organization that drives security products into various marketplaces |
|
internal cybersecurity accreditation organization with over 10,000 members |
|
external facing forensics community for small and medium businesses |
|
independent organization that brings together experts to share knowledge and develop voluntary, consensus-based, market relevant International Standard |