Digital evidence must:
A.
Be Authentic, complete and reliable
B.
Not prove the attackers actions
C.
Be Volatile
D.
Cast doubt on the authenticity and veracity of the evidence
Be Authentic, complete and reliable
Business continuity is defined as the ability of an organization to continue to function even after a disastrous
event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant
systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?
A.
Forensics Procedure Plan
B.
Business Recovery Plan
C.
Sales and Marketing plan
D.
New business strategy plan
Business Recovery Plan
An information security incident is
A.
Any real or suspected adverse event in relation to the security of computer systems or networks
B.
Any event that disrupts normal today’s business functions
C.
Any event that breaches the availability of information assets
D.
All of the above
All of the above
Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :
A.
Threat-source motivation and capability
B.
Nature of the vulnerability
C.
Existence and effectiveness of the current controls
D.
All the above
All the above
Which of the following is NOT one of the techniques used to respond to insider threats:
A.
Placing malicious users in quarantine network, so that attack cannot be spread
B.
Preventing malicious users from accessing unclassified information
C.
Disabling the computer systems from network connection
D.
Blocking malicious user accounts
Preventing malicious users from accessing unclassified information
Page 7 out of 33 Pages |
Previous |