Go Back on 212-89 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

212-89 Practice Test


Page 11 out of 33 Pages

Incident response team must adhere to the following:


A.

Stay calm and document everything


B.

Assess the situation


C.

Notify appropriate personnel


D.

All the above





D.
  

All the above



What is the best staffing model for an incident response team if current employees’ expertise is very low?


A.

Fully outsourced


B.

Partially outsourced


C.

Fully insourced


D.

All the above





A.
  

Fully outsourced



An access control policy authorized a group of users to perform a set of actions on a set of resources. Access
to resources is based on necessity and if a particular job role requires the use of those resources. Which of the
following is NOT a fundamental element of access control policy


A.

Action group: group of actions performed by the users on resources


B.

Development group: group of persons who develop the policy


C.

Resource group: resources controlled by the policy


D.

Access group: group of users to which the policy applies





B.
  

Development group: group of persons who develop the policy



A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is
targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect
multiple systems which are known as:


A.

Trojans


B.

Zombies


C.

Spyware


D.

Worms





B.
  

Zombies



A computer forensic investigator must perform a proper investigation to protect digital evidence. During the
investigation, an investigator needs to process large amounts of data using a combination of automated and
manual methods. Identify the computer forensic process involved:


A.

Analysis


B.

Preparation


C.

Examination


D.

Collection





C.
  

Examination




Page 11 out of 33 Pages
Previous