Performing Vulnerability Assessment is an example of a:
A.
Incident Response
B.
Incident Handling
C.
Pre-Incident Preparation
D.
Post Incident Management
Pre-Incident Preparation
The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:
A.
An Adware
B.
Mail bomb
C.
A Virus Hoax
D.
Spear Phishing
A Virus Hoax
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.
A.
A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager
B.
A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager
C.
A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations
D.
A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident Coordinator
A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations
The Malicious code that is installed on the computer without user’s knowledge to acquire information from the
user’s machine and send it to the attacker who can access it remotely is called:
A.
Spyware
B.
Logic Bomb
C.
Trojan
D.
Worm
Spyware
Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?
A.
Apply the control
B.
Not to apply the control
C.
Use qualitative risk assessment
D.
Use semi-qualitative risk assessment instead
Not to apply the control
Page 8 out of 33 Pages |
Previous |