Go Back on 212-89 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

212-89 Practice Test


Page 7 out of 33 Pages

Digital evidence must:


A.

Be Authentic, complete and reliable


B.

Not prove the attackers actions


C.

Be Volatile


D.

Cast doubt on the authenticity and veracity of the evidence





A.
  

Be Authentic, complete and reliable



Business continuity is defined as the ability of an organization to continue to function even after a disastrous
event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant
systems, as well as a solid backup and recovery strategy. Identify the plan which is mandatory part of a
business continuity plan?


A.

Forensics Procedure Plan


B.

Business Recovery Plan


C.

Sales and Marketing plan


D.

New business strategy plan





B.
  

Business Recovery Plan



An information security incident is


A.

Any real or suspected adverse event in relation to the security of computer systems or networks


B.

Any event that disrupts normal today’s business functions


C.

Any event that breaches the availability of information assets


D.

All of the above





D.
  

All of the above



Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :


A.

Threat-source motivation and capability


B.

Nature of the vulnerability


C.

Existence and effectiveness of the current controls


D.

All the above





D.
  

All the above



Which of the following is NOT one of the techniques used to respond to insider threats:


A.

Placing malicious users in quarantine network, so that attack cannot be spread


B.

Preventing malicious users from accessing unclassified information


C.

Disabling the computer systems from network connection


D.

Blocking malicious user accounts





B.
  

Preventing malicious users from accessing unclassified information




Page 7 out of 33 Pages
Previous