The role that applies appropriate technology and tries to eradicate and recover from the incident is known as:
A.
Incident Manager
B.
Incident Analyst
C.
Incident Handler
D.
Incident coordinator
Incident Analyst
The correct sequence of incident management process is:
A.
Prepare, protect, triage, detect and respond
B.
Prepare, protect, detect, triage and respond
C.
Prepare, detect, protect, triage and respond
D.
Prepare, protect, detect, respond and triage
Prepare, protect, detect, triage and respond
CERT members can provide critical support services to first responders such as:
A.
Immediate assistance to victims
B.
Consolidated automated service process management platform
C.
Organizing spontaneous volunteers at a disaster site
D.
A + C
A + C
To whom should an information security incident be reported?
A.
It should not be reported at all and it is better to resolve it internally
B.
Human resources and Legal Department
C.
It should be reported according to the incident reporting & handling policy
D.
Chief Information Security Officer
It should be reported according to the incident reporting & handling policy
Which of the following is NOT one of the common techniques used to detect Insider threats:
A.
Spotting an increase in their performance
B.
Observing employee tardiness and unexplained absenteeism
C.
Observing employee sick leaves
D.
Spotting conflicts with supervisors and coworkers
Spotting an increase in their performance
Page 10 out of 33 Pages |
Previous |