Website: Vce To PDF Converter: Facebook: Twitter:: 212-89.vceplus - Premium.Exam.163Q
Website: Vce To PDF Converter: Facebook: Twitter:: 212-89.vceplus - Premium.Exam.163Q
163q
Number: 212-89
Passing Score: 800
Time Limit: 120 min
File Version: 1.0
Website: https://vceplus.com
VCE to PDF Converter: https://vceplus.com/vce-to-pdf/
Facebook: https://www.facebook.com/VCE.For.All.VN/
Twitter : https://twitter.com/VCE_Plus
212-89
Version 1.0
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Exam A
QUESTION 1
Which of the following terms may be defined as “a measure of possible inability to achieve a goal, objective, or target within a defined security, cost plan and technical limitations that adversely affects the organization’s operation and
revenues?
A. Risk
B. Vulnerability
C. Threat
D. Incident Response
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
A distributed Denial of Service (DDoS) attack is a more common type of DoS Attack, where a single system is targeted by a large number of infected machines over the Internet. In a DDoS attack, attackers first infect multiple systems which
are known as:
A. Trojans
B. ZombiesC. Spyware
D. Worms
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 3
The goal of incident response is to handle the incident in a way that minimizes damage and reduces recovery time and cost. Which of the following does NOT constitute a goal of incident response?
A. Dealing with human resources department and various employee conflict behaviors.
B. Using information gathered during incident handling to prepare for handling future incidents in a better way and to provide stronger protection for systems and data.
C. Helping personal to recover quickly and efficiently from security incidents, minimizing loss or theft and disruption of services.
D. Dealing properly with legal issues that may arise during incidents.
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
An organization faced an information security incident where a disgruntled employee passed sensitive access control information to a competitor. The organization’s incident response manager, upon investigation, found that the incident must
be handled within a few hours on the same day to maintain business continuity and market competitiveness. How would you categorize such information security incident?
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
Business continuity is defined as the ability of an organization to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a
solid backup and recovery strategy. Identify the plan which is mandatory part of a business continuity plan?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 6
The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.
A. A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident Manager
B. A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident ManagerC. A- Incident Coordinator, B- Constituency, C-
Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations
D. A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident Coordinator
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 8
A computer Risk Policy is a set of ideas to be implemented to overcome the risk associated with computer security incidents. Identify the procedure that is NOT part of the computer risk policy?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 9 Identify the network security incident where intended authorized users are prevented from using system, network, or applications by flooding the network with high volume of traffic that consumes all existing
network resources.
A. URL Manipulation
B. XSS Attack
C. SQL Injection
D. Denial of Service Attack
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 10 Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and extent
of an incident?
A. Eradication
B. Containment
C. Identification
D. Data collection
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 11
Identify the malicious program that is masked as a genuine harmless program and gives the attacker unrestricted access to the user’s information and system. These programs may unleash dangerous programs that may erase the
unsuspecting user’s disk and send the victim’s credit card numbers and passwords to a stranger.
A. Cookie tracker
B. Worm
C. Trojan
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. Virus
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 12
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated as:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 13
An incident recovery plan is a statement of actions that should be taken before, during or after an incident. Identify which of the following is NOT an objective of the incident recovery plan?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 14
Risk is defined as the probability of the occurrence of an incident. Risk formulation generally begins with the likeliness of an event’s occurrence, the harm it may cause and is usually denoted as Risk = ∑(events)X(Probability of occurrence)
X?
A. Magnitude
B. Probability
C. Consequences
D. Significance
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 15
An audit trail policy collects all audit trails such as series of records of computer events, about an operating system, application or user activities. Which of the following statements is NOT true for an audit trail policy:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. It helps calculating intangible losses to the organization due to incident
B. It helps tracking individual actions and allows users to be personally accountable for their actions
C. It helps in compliance to various regulatory laws, rules,and guidelines
D. It helps in reconstructing the events after a problem has occurred
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 16
Computer forensics is methodical series of techniques and procedures for gathering evidence from computing equipment, various storage devices and or digital media that can be presented in a course of law in a coherent and meaningful
format. Which one of the following is an appropriate flow of steps in the computer forensics process:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 17
Multiple component incidents consist of a combination of two or more attacks in a system. Which of the following is not a multiple component incident?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 18
Computer Forensics is the branch of forensic science in which legal evidence is found in any computer or any digital media device. Of the following, who is responsible for examining the evidence acquired and separating the useful evidence?
A. Evidence Supervisor
B. Evidence Documenter
C. Evidence Manager
D. Evidence Examiner/ Investigator
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 19 The network perimeter should be configured in such a way that it denies all incoming and outgoing traffic/ services that are not required. Which service listed below, if blocked, can help in preventing Denial of
Service attack?
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. SAM service
B. POP3 service
C. SMTP service
D. Echo service
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 20
A US Federal agency network was the target of a DoS attack that prevented and impaired the normal authorized functionality of the networks. According to agency’s reporting timeframe guidelines, this incident should be reported within two
(2) HOURS of discovery/detection if the successful attack is still ongoing and the agency is unable to successfully mitigate the activity. Which incident category of the US Federal Agency does this incident belong to?
A. CAT 5
B. CAT 1
C. CAT 2
D. CAT 6
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 21 US-CERT and Federal civilian agencies use the reporting timeframe criteria in the federal agency reporting categorization. What is the timeframe required to report an incident under the CAT 4 Federal
Agency category?
A. Weekly
B. Within four (4) hours of discovery/detection if the successful attack is still ongoing and agency is unable to successfully mitigate activity
C. Within two (2) hours of discovery/detection
D. Monthly
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 22 Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will maintain the information assurance (IA) and security posture of a
system or site.
A. NIASAP
B. NIAAAP
C. NIPACP
D. NIACAP
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 23 Policies are designed to protect the organizational resources on the network by establishing the set rules and procedures. Which of the following policies authorizes a group of users to perform a set of actions on a
set of resources?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 24
When an employee is terminated from his or her job, what should be the next immediate step taken by an organization?
A. All access rights of the employee to physical locations, networks, systems, applications and data should be disabled
B. The organization should enforce separation of duties
C. The access requests granted to an employee should be documented and vetted by the supervisor
D. The organization should monitor the activities of the system administrators and privileged users who have permissions to access the sensitive information
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 25
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are defined:
A. Identification Vulnerabilities
B. Control analysis
C. Threat identification
D. System characterization
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 26
In the Control Analysis stage of the NIST’s risk assessment methodology, technical and none technical control methods are classified into two categories. What are these two control categories?
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 27 Which of the following incident recovery testing methods works by creating a mock disaster, like fire to identify the reaction of the procedures that are implemented to handle
such situations?
A. Scenario testing
B. Facility testing
C. Live walk-through testing
D. Procedure testing
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 28 An incident is analyzed for its nature, intensity and its effects on the network and systems. Which stage of the incident response and handling process involves auditing the system and
network log files?
A. Incident recording
B. Reporting
C. Containment
D. Identification
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 29
Which among the following CERTs is an Internet provider to higher education institutions and various other research institutions in the Netherlands and deals with all cases related to computer security incidents in which a customer is involved
either as a victim or as a suspect?
A. NET-CERT
B. DFN-CERT
C. Funet CERT
D. SURFnet-CERT
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 30
One of the main objectives of incident management is to prevent incidents and attacks by tightening the physical security of the system or infrastructure. According to CERT’s incident management process, which stage focuses on
implementing infrastructure improvements resulting from postmortem reviews or other process improvement mechanisms?
A. Protection
B. Preparation
C. Detection
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. Triage
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 31
Risk management consists of three processes, risk assessment, mitigation and evaluation. Risk assessment determines the extent of the potential threat and the risk associated with an IT system through its SDLC. How many primary steps
does NIST’s risk assessment methodology involve?
A. Twelve
B. FourC. Six
D. Nine
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 32
Insider threats can be detected by observing concerning behaviors exhibited by insiders, such as conflicts with supervisors and coworkers, decline in performance, tardiness or unexplained absenteeism. Select the technique that helps in
detecting insider threats:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 33
Contingency planning enables organizations to develop and maintain effective methods to handle emergencies. Every organization will have its own specific requirements that the planning should address. There are five major components of
the IT contingency plan, namely supporting information, notification activation, recovery and reconstitution and plan appendices. What is the main purpose of the reconstitution plan?
A. To restore the original site, tests systems to prevent the incident and terminates operations
B. To define the notification procedures, damage assessments and offers the plan activation
C. To provide the introduction and detailed concept of the contingency plan
D. To provide a sequence of recovery activities with the help of recovery procedures
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 34
The insider risk matrix consists of technical literacy and business process knowledge vectors. Considering the matrix, one can conclude that:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. If the insider’s technical literacy is low and process knowledge is high, the risk posed by the threat will be insignificant.
B. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be insignificant.
C. If the insider’s technical literacy is high and process knowledge is low, the risk posed by the threat will be high.
D. If the insider’s technical literacy and process knowledge are high, the risk posed by the threat will be high.
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 36 Which one of the following is the correct sequence of flow of the stages in an
incident response:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 37
Organizations or incident response teams need to protect the evidence for any future legal actions that may be taken against perpetrators that intentionally attacked the computer system. EVIDENCE PROTECTION is also required to meet
legal compliance issues. Which of the following documents helps in protecting evidence from physical or logical damage:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 38
Except for some common roles, the roles in an IRT are distinct for every organization. Which among the following is the role played by the Incident Coordinator of an IRT?
A. Links the appropriate technology to the incident to ensure that the foundation’s offices are returned to normal operations as quickly as possible
B. Links the groups that are affected by the incidents, such as legal, human resources, different business areas and management
C. Applies the appropriate technology and tries to eradicate and recover from the incidentD. Focuses on the incident and handles it from management and technical point of view
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 39
The data on the affected system must be backed up so that it can be retrieved if it is damaged during incident response. The system backup can also be used for further investigations of the incident. Identify the stage of the incident response
and handling process in which complete backup of the infected system is carried out?
A. Containment
B. Eradication
C. Incident recording
D. Incident investigation
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 41
A computer virus hoax is a message warning the recipient of non-existent computer virus. The message is usually a chain e-mail that tells the recipient to forward it to every one they know. Which of the following is NOT a symptom of virus
hoax message?
A. The message prompts the end user to forward it to his / her e-mail contact list and gain monetary benefits in doing so
B. The message from a known email id is caught by SPAM filters due to change of filter settings
C. The message warns to delete certain files if the user does not take appropriate actionD. The message prompts the user to install Anti-Virus
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 42 In which of the steps of NIST’s risk assessment methodology are the boundary of the IT system, along with the resources and the information that constitute the
system identified?
A. Likelihood Determination
B. Control recommendation
C. System characterization
D. Control analysis
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 43 ADAM, an employee from a multinational company, uses his company’s accounts to send e-mails to a third party with their spoofed mail address. How can you categorize this
type of account?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 44
A security policy will take the form of a document or a collection of documents, depending on the situation or usage. It can become a point of reference in case a violation occurs that results in dismissal or other penalty. Which of the following
is NOT true for a good security policy?
A. It must be enforceable with security tools where appropriate and with sanctions where actual prevention is not technically feasible
B. It must be approved by court of law after verifications of the stated terms and facts
C. It must be implemented through system administration procedures, publishing of acceptable use guide lines or other appropriate methodsD. It must clearly define the areas of responsibilities of the users, administrators and management
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 45 Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following helps in recognizing and separating the infected hosts from the
information system?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 46
An access control policy authorized a group of users to perform a set of actions on a set of resources. Access to resources is based on necessity and if a particular job role requires the use of those resources. Which of the following is NOT a
fundamental element of access control policy
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 47 Computer viruses are malicious software programs that infect computers and corrupt or delete the data on them. Identify the virus type that specifically infects
Microsoft Word files?
A. Micro Virus
B. File Infector
C. Macro Virus
D. Boot Sector virus
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 48
The type of relationship between CSIRT and its constituency have an impact on the services provided by the CSIRT. Identify the level of the authority that enables members of CSIRT to undertake any necessary actions on behalf of their
constituency?
A. Full-level authority
B. Mid-level authority
C. Half-level authority
D. Shared-level authority
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 49
Digital evidence plays a major role in prosecuting cyber criminals. John is a cyber-crime investigator, is asked to investigate a child pornography case. The personal computer of the criminal in question was confiscated by the county police.
Which of the following evidence will lead John in his investigation?
A. SAM file
B. Web serve log
C. Routing table list
D. Web browser history
Correct Answer: D
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
QUESTION 50
An estimation of the expected losses after an incident helps organization in prioritizing and formulating their incident response. The cost of an incident can be categorized as a tangible and intangible cost. Identify the tangible cost associated
with virus outbreak?
A. Loss of goodwill
B. Damage to corporate reputation
C. Psychological damage
D. Lost productivity damage
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 51 Which of the following incidents are reported under CAT -5 federal
agency category?
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 52
One of the goals of CSIRT is to manage security problems by taking a certain approach towards the customers’ security vulnerabilities and by responding effectively to potential information security incidents. Identify the incident response
approach that focuses on developing the infrastructure and security processes before the occurrence or detection of an event or any incident:
A. Interactive approach
B. Introductive approach
C. Proactive approach
D. Qualitative approach
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 53
A computer forensic investigator must perform a proper investigation to protect digital evidence. During the investigation, an investigator needs to process large amounts of data using a combination of automated and manual methods. Identify
the computer forensic process involved:
A. Analysis
B. Preparation
C. Examination
D. Collection
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 54
Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of the incident response team. Identify one of the responsibilities of the internal
auditor as part of the incident response team:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 55
A risk mitigation strategy determines the circumstances under which an action has to be taken to minimize and overcome risks. Identify the risk mitigation strategy that focuses on minimizing the probability of risk and losses by searching for
vulnerabilities in the system and appropriate controls:
A. Risk Assumption
B. Research and acknowledgment
C. Risk limitation
D. Risk absorption
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 56 Based on the some statistics; what is the typical number
one top incident?
A. Phishing
B. Policy violation
C. Un-authorized access
D. Malware
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. Threat Agent
B. Vulnerability
C. Attack
D. Risk
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59 The IDS and IPS system logs indicating an unusual deviation from typical network traffic
flows; this is called:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. Insiders
B. Outsiders
C. Business partners
D. Suppliers
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. A Precursor
B. An Indication
C. A Proactive
D. A Reactive
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
A. Potential impact
B. Current damage
C. Criticality of affected systems
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 65 An information
security incident is
A. Any real or suspected adverse event in relation to the security of computer systems or networks
B. Any event that disrupts normal today’s business functions
C. Any event that breaches the availability of information assets
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
D. All of the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 67 If the loss anticipated is greater than the agreed upon threshold; the
organization will:
Explanation/Reference:
QUESTION 68 A payroll system has a vulnerability that cannot be exploited by current technology. Which of the following is correct
about this scenario:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
C. Existence and effectiveness of the current controls
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
A. Risk Mitigation
B. Risk Transfer
C. Risk Assumption
D. Risk Avoidance
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
A. Residual risk
B. Unaccepted risk
C. Low risk
D. Critical risk
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 72 Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you
advise Adam to do?
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. It is Subjective but faster than Qualitative Risk Analysis
B. Easily automated
C. Better than Qualitative Risk Analysis
D. Uses levels and descriptive expressions
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. Nessus
B. Wireshark
C. CRAMM
D. Nmap
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 75
In NIST risk assessment/ methodology; the process of identifying the boundaries of an IT system along with the resources and information that constitute the system is known as:
A. Asset Identification
B. System characterization
C. Asset valuation
D. System classification
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
A. Incident Response
B. Incident Handling
C. Pre-Incident Preparation
D. Post Incident Management
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 77 The correct sequence of Incident Response
and Handling is:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 78 Preventing the incident from spreading and limiting the scope of the
incident is known as:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 79
What is the best staffing model for an incident response team if current employees’ expertise is very low?
A. Fully outsourced
B. Partially outsourced
C. Fully insourced
D. All the above
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 81 Incident response team must adhere
to the following:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
A. CRAMM
B. RTIR
C. NETSTAT
D. EAR/ Pilar
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 83 Removing or eliminating the root cause of the
incident is called:
A. Incident Eradication
B. Incident Protection
C. Incident Containment
D. Incident Classification
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 84 Which of the following is a correct statement about incident management, handling
and response:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 85 Incident
Response Plan requires
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 86
The service organization that provides 24x7 computer security incident response services to any user, company, government agency, or organization is known as:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 87 The main feature offered by PGP
Desktop Email is:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
A. Vulnerability handling
B. Technology watch
C. Development of security tools
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 89 The role that applies appropriate technology and tries to eradicate and recover from the
incident is known as:
A. Incident Manager
B. Incident Analyst
C. Incident Handler
D. Incident coordinator
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 91 The region where the CSIRT is bound to serve and what does it and give service
to is known as:
A. Consistency
B. Confidentiality
C. Constituency
D. None of the above
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 92 The program that helps to train people to be better prepared to respond to emergency situations in their
communities is known as:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 93
CSIRT can be implemented at:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 95
Common name(s) for CSIRT is(are)
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 96
An active vulnerability scanner featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis is called:
A. Nessus
B. CyberCop
C. EtherApe
D. nmap
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 97
The free, open source, TCP/IP protocol analyzer, sniffer and packet capturing utility standard across many industries and educational institutions is known as:
A. Snort
B. Wireshark
C. Cain & Able
D. nmap
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 98 Installing a password cracking tool, downloading pornography material, sending emails to colleagues which irritates them and hosting unauthorized websites on the company’s computer
are considered:
Explanation/Reference:
QUESTION 99 Changing the web server contents, Accessing the workstation using a false ID and Copying sensitive data without authorization
are examples of:
A. DDoS attacks
B. Unauthorized access attacks
C. Malware attacks
D. Social Engineering attacks
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 101 The very well-known free open source port, OS and service scanner and network
discovery utility is called:
A. Wireshark
B. Nmap (Network Mapper)
C. Snort
D. SAINT
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 102 In a DDoS attack, attackers first infect multiple systems, which are then used to attack a particular target directly. Those
systems are called:
A. Honey Pots
B. Relays
C. Zombies
D. Handlers
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 103 The open source TCP/IP network intrusion prevention and detection system (IDS/IPS), uses a rule-driven language, performs real-time traffic analysis and packet
logging is known as:
A. Snort
B. Wireshark
C. Nessus
D. SAINT
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 105
They type of attack that prevents the authorized users to access networks, systems, or applications by exhausting the network resources and sending illegal requests to an application is known as:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 106
A malware code that infects computer files, corrupts or deletes the data in them and requires a host file to propagate is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
A. Spyware
B. adware
C. Virus
D. Malware
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
A. Gathering information
B. Displaying popups
C. Intimidating users
D. Replicating
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 109 ________________
attach(es) to files
A. adware
B. Spyware
C. Viruses
D. Worms
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 110
A self-replicating malicious code that does not alter files but resides in active memory and duplicates itself, spreads through the infected network automatically and takes advantage of file or information transport features on the system to
travel independently is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 111 A malicious security-breaking code that is disguised as any useful program that installs an executable programs when a file is opened and allows others to control the victim’s
system is called:
A. Trojan
B. Worm
C. Virus
D. RootKit
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 112
The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:
A. An Adware
B. Mail bomb
C. A Virus Hoax
D. Spear Phishing
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
QUESTION 113 The free utility which quickly scans Systems running Windows OS to find settings that may have been changed by spyware, malware, or other unwanted
programs is called:
A. Tripwire
B. HijackThis
C. Stinger
D. F-Secure Anti-virus
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 114 The Malicious code that is installed on the computer without user’s knowledge to acquire information from the user’s machine and send it to the attacker who can access it
remotely is called:
A. Spyware
B. Logic Bomb
C. Trojan
D. Worm
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 115 A software application in which advertising banners are displayed while the program is running that delivers ads to display pop-up windows or bars that appears on a computer screen or
browser is called:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 116
A Host is infected by worms that propagates through a vulnerable service; the sign(s) of the presence of the worm include:
Correct Answer: C
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 118 The sign(s) of the presence of malicious code on a host infected by a virus which is delivered via
e-mail could be:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 119 Which of the following is NOT one of the common techniques used to
detect Insider threats:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 120 Which of the following is NOT one of the techniques used to respond
to insider threats:
Correct Answer: B
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 121
Authorized users with privileged access who misuse the corporate informational assets and directly affects the confidentiality, integrity, and availability of the assets are known as:
A. Outsider threats
B. Social Engineers
C. Insider threats
D. Zombies
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 122
Keyloggers do NOT:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 124
The USB tool (depicted below) that is connected to male USB Keyboard cable and not detected by anti-spyware tools is most likely called:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Software Key Grabber
B. Hardware Keylogger
C. USB adapter
D. Anti-Keylogger
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 125 Insiders understand corporate business functions. What is the correct sequence of activities performed by Insiders to damage
company assets:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 126 Spyware tool used to record malicious user’s computer activities and keyboard
stokes is called:
A. adware
B. Keylogger
C. Rootkit
D. Firewall
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 127
Insiders may be:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Ignorant employees
B. Carless administrators
C. Disgruntled staff members
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 130
The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Policy
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
A. Access Data FTK
B. EAR/ Pilar
C. Guidance Software EnCase Forensic
D. Helix
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 132
The Linux command used to make binary copies of computer media and as a disk imaging tool if given a raw disk device as its input is:
A. “dd” command
B. “netstat” command
C. “nslookup” command
D. “find” command
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 133 What command does a Digital Forensic Examiner use to display the list of all open ports and the associated IP addresses on a victim computer to identify the established
connections on it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 134 What command does a Digital Forensic Examiner use to display the list of all IP addresses and their associated MAC addresses on a victim computer to identify the machines that were
communicating with it:
A. “arp” command
B. “netstat –an” command
C. “dd” command
D. “ifconfig” command
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 135
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
The individual who recovers, analyzes, and preserves computer and related materials to be presented as evidence in a court of law and identifies the evidence, estimates the potential impact of the malicious activity on the victim, and
assesses the intent and identity of the perpetrator is called:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 136
To recover, analyze, and preserve computer and related materials in such a way that it can be presented as evidence in a court of law and identify the evidence in short time, estimate the potential impact of the malicious activity on the victim,
and assess the intent and identity of the perpetrator is known as:
A. Computer Forensics
B. Digital Forensic Analysis
C. Forensic Readiness
D. Digital Forensic Examiner
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 137 Any information of probative value that is either stored or transmitted in a digital form during a computer
crime is called:
A. Digital evidence
B. Computer Emails
C. Digital investigation
D. Digital Forensic Examiner
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 138
Digital evidence must:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 139 Which of the following is NOT one of the Computer
Forensic types:
A. USB Forensics
B. Email Forensics
C. Forensic Archaeology
D. Image Forensics
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 140 The correct order or sequence of the Computer
Forensic processes is:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 141
The person who offers his formal opinion as a testimony about a computer crime incident in the court of law is known as:
A. Expert Witness
B. Incident Analyzer
C. Incident Responder
D. Evidence Documenter
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
A. Data Files
B. Backup tapes
C. Other media sources
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 143 A methodical series of techniques and procedures for gathering evidence, from computing equipment and various storage devices and digital media, that can be presented in a court of law in a coherent and meaningful
format is called:
A. Forensic Analysis
B. Computer Forensics
C. Forensic Readiness
D. Steganalysis
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 144 Incidents are
reported in order to:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 145 According to US-CERT; if an agency is unable to successfully mitigate a DOS attack it must be
reported within:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 147 Incident may be
reported using/ by:
A. Phone call
B. Facsimile (Fax)
C. Email or on-line Web form
D. All the above
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 149
The process of rebuilding and restoring the computer systems affected by an incident to normal operational stage including all the processes, policies and tools is known as:
A. Incident Management
B. Incident Response
C. Incident Recovery
D. Incident Handling
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
QUESTION 151 Which test is conducted to determine the incident recovery
procedures effectiveness?
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 152 Business Continuity provides a planning methodology that allows continuity in
business operations:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 153
The ability of an agency to continue to function even after a disastrous event, accomplished through the deployment of redundant hardware and software, the use of fault tolerant systems, as well as a solid backup and recovery strategy is
known as:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: A
Section: (none)
Explanation
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Explanation/Reference:
QUESTION 155
The policy that defines which set of events needs to be logged in order to capture and review the important data in a timely manner is known as:
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 157 The product of intellect that has commercial value and includes copyrights and
trademarks is called:
A. Intellectual property
B. Trade secrets
C. Logos
D. Patents
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
Correct Answer: D
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Section: (none)
Explanation
Explanation/Reference:
QUESTION 159 Ensuring the integrity, confidentiality and availability of electronic protected health information of a
patient is known as:
A. Gramm-Leach-Bliley Act
B. Health Insurance Portability and Privacy Act
C. Social Security Act
D. Sarbanes-Oxley Act
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 160
According to the Fourth Amendment of USA PATRIOT Act of 2001; if a search does NOT violate a person’s “reasonable” or “legitimate” expectation of privacy then it is considered:
A. Constitutional/ Legitimate
B. Illegal/ illegitimate
C. Unethical
D. None of the above
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
QUESTION 161 Bit stream image copy of the digital evidence must be
performed in order to:
Correct Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 162
According to the Evidence Preservation policy, a forensic investigator should make at least ..................... image copies of the digital evidence.
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com
Correct Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 163
A living high level document that states in writing a requirement and directions on how an agency plans to protect its information technology assets is called:
A. Information security Policy
B. Information security Procedure
C. Information security Baseline
D. Information security Standard
Correct Answer: A
Section: (none)
Explanation
Explanation/Reference:
www.vceplus.com - Free Questions & Answers - Online Courses - Convert VCE to PDF - VCEplus.com