Go Back on 212-89 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

212-89 Practice Test


Page 2 out of 33 Pages

The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet logging is known as:


A.

Snort


B.

Wireshark


C.

Nessus


D.

SAINT





A.
  

Snort



A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim’s system is called:


A.

Trojan


B.

Worm


C.

Virus


D.

RootKit





A.
  

Trojan



Which of the following can be considered synonymous:


A.

Hazard and Threat


B.

Threat and Threat Agent


C.

Precaution and countermeasure


D.

Vulnerability and Danger





A.
  

Hazard and Threat



Which of the following is NOT a digital forensic analysis tool:


A.

Access Data FTK


B.

EAR/ Pilar


C.

Guidance Software EnCase Forensic


D.

Helix





B.
  

EAR/ Pilar



One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding effectively to potential information security incidents.
Identify the incident response approach that focuses on developing the infrastructure and security processes
before the occurrence or detection of an event or any incident:


A.

Interactive approach


B.

Introductive approach


C.

Proactive approach


D.

Qualitative approach





C.
  

Proactive approach




Page 2 out of 33 Pages
Previous