Go Back on 212-89 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

212-89 Practice Test


Page 8 out of 33 Pages

Performing Vulnerability Assessment is an example of a:


A.

Incident Response


B.

Incident Handling


C.

Pre-Incident Preparation


D.

Post Incident Management





C.
  

Pre-Incident Preparation



The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:


A.

An Adware


B.

Mail bomb


C.

A Virus Hoax


D.

Spear Phishing





C.
  

A Virus Hoax



The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.



A.

A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager


B.

A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager


C.

A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations


D.

A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident Coordinator





C.
  

A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations



The Malicious code that is installed on the computer without user’s knowledge to acquire information from the
user’s machine and send it to the attacker who can access it remotely is called:


A.

Spyware


B.

Logic Bomb


C.

Trojan


D.

Worm





A.
  

Spyware



Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?


A.

Apply the control


B.

Not to apply the control


C.

Use qualitative risk assessment


D.

Use semi-qualitative risk assessment instead





B.
  

Not to apply the control




Page 8 out of 33 Pages
Previous