The USB tool (depicted below) that is connected to male USB Keyboard cable and not detected by anti-spyware tools is most likely called:
A.
Software Key Grabber
B.
Hardware Keylogger
C.
USB adapter
D.
Anti-Keylogger
Hardware Keylogger
The largest number of cyber-attacks are conducted by:
A.
Insiders
B.
Outsiders
C.
Business partners
D.
Suppliers
Outsiders
Which test is conducted to determine the incident recovery procedures effectiveness?
A.
Live walk-throughs of procedures
B.
Scenario testing
C.
Department-level test
D.
Facility-level test
Live walk-throughs of procedures
The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:
A.
Computer Forensics
B.
Digital Forensic Analysis
C.
Forensic Readiness
D.
Digital Forensic Policy
Forensic Readiness
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:
A.
Configure information security controls
B.
Perform necessary action to block the network traffic from suspected intruder
C.
Identify and report security loopholes to the management for necessary actions
D.
Coordinate incident containment activities with the information security officer
Identify and report security loopholes to the management for necessary actions
Page 9 out of 33 Pages |
Previous |