Which of the following may be considered as insider threat(s):
A.
An employee having no clashes with supervisors and coworkers
B.
Disgruntled system administrators
C.
An employee who gets an annual 7% salary raise
D.
An employee with an insignificant technical literacy and business process knowledge
Disgruntled system administrators
An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:
A.
Nessus
B.
CyberCop
C.
EtherApe
D.
nmap
Nessus
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT constitute a goal of incident response?
A.
Dealing with human resources department and various employee conflict behaviors.
B.
Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and data
C.
Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D.
Dealing properly with legal issues that may arise during incidents.
Dealing with human resources department and various employee conflict behaviors.
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy that focuses on minimizing the probability of risk and losses by searching for vulnerabilities in the system and appropriate controls:
A.
Risk Assumption
B.
Research and acknowledgment
C.
Risk limitation
D.
Risk absorption
Research and acknowledgment
Which of the following is an incident tracking, reporting and handling tool:
A.
CRAMM
B.
RTIR
C.
NETSTAT
D.
EAR/ Pilar
RTIR
Page 1 out of 33 Pages |