Go Back on 212-89 Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

212-89 Practice Test


Page 9 out of 33 Pages

The USB tool (depicted below) that is connected to male USB Keyboard cable and not detected by anti-spyware tools is most likely called:





A.

Software Key Grabber


B.

Hardware Keylogger


C.

USB adapter


D.

Anti-Keylogger





B.
  

Hardware Keylogger



The largest number of cyber-attacks are conducted by:


A.

Insiders


B.

Outsiders


C.

Business partners


D.

Suppliers





B.
  

Outsiders



Which test is conducted to determine the incident recovery procedures effectiveness?


A.

Live walk-throughs of procedures


B.

Scenario testing


C.

Department-level test


D.

Facility-level test





A.
  

Live walk-throughs of procedures



The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:


A.

Computer Forensics


B.

Digital Forensic Analysis


C.

Forensic Readiness


D.

Digital Forensic Policy





C.
  

Forensic Readiness



Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:


A.

Configure information security controls


B.

Perform necessary action to block the network traffic from suspected intruder


C.

Identify and report security loopholes to the management for necessary actions


D.

Coordinate incident containment activities with the information security officer





C.
  

Identify and report security loopholes to the management for necessary actions




Page 9 out of 33 Pages
Previous