The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:
A.
A Precursor
B.
An Indication
C.
A Proactive
D.
A Reactive
An Indication
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
A.
Decrease in network usage
B.
Established connection attempts targeted at the vulnerable services
C.
System becomes instable or crashes
D.
All the above
System becomes instable or crashes
A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct about this scenario:
A.
The risk must be urgently mitigated
B.
The risk must be transferred immediately
C.
The risk is not present at this time
D.
The risk is accepted
The risk is not present at this time
The most common type(s) of intellectual property is(are):
A.
Copyrights and Trademarks
B.
Patents
C.
Industrial design rights & Trade secrets
D.
All the above
All the above
Business Continuity provides a planning methodology that allows continuity in business operations:
A.
Before and after a disaster
B.
Before a disaster
C.
Before, during and after a disaster
Before, during and after a disaster
Page 5 out of 33 Pages |
Previous |