Crackquiz: Security Incident Computer Security Incident Response Team
Crackquiz: Security Incident Computer Security Incident Response Team
crackquiz.com/question/category/endpoint-security
Incident response is an organized approach to addressing and managing the aftermath of a security
breach or cyberattack, also known as an IT incident, computer incident or security incident. The
goal is to handle the situation in a way that limits damage and reduces recovery time and
costs.Ideally, incident response activities are conducted by the organization's computer security
incident response team (CSIRT), a group that has been previously selected to include
informationsecurity and general IT staff as well as C-suite level members. The team may also
include representatives from the legal, human resources and public relations departments. The
incident response team follows the organization's incident response plan (IRP), which is a set of
written instructions that outline the organization's response to network events, security incidents
and confirmed breaches.
Which feature of anti-virus softwares removes or isolates potentially malicious files and
applications?File quarantine
Which among the following is most useful to protect complete networks?Endpoint Security
A centrally managed solution that protects networks and all their endpoints against threats with
the help of various security tools:endpoint security
What is the common name for remote computing devices that communicate back and forth with a
network to which they are connected?endpoints
A single program responsible for scanning, detecting, and removing malware, spyware, adware,
ransomware and other such malicious entities.Anti-virus
Which of the following feature of endpoint security solutions involves real timemonitoring of
network topology, connections, and traffic flow? Continous Detection
is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. Chain of attack
is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. True
----is the term that is used to refer to the method by which a malicious portable executable has
reached an endpoint. Attack Tr
----is an organized approach to addressing and managing the aftermath of a security breach or
cyberattack. Incident Response
Testing can be done effectively only on a system connected to the internet. False
------- is a technique where attackers modify legitimate software to hide a malicious application.
code caves
Which among the following is more focused on securing networks? Network securing
Which of the following are essential features to ensure data security? All of these
Which of the following aspects help analyze the effectiveness of an endpoint security solution?
All of these
Which of the following approaches to testing is most appropriate when the results are expected
to be precise? One at a time
Which among the following usually refers to a cloud-based solution? Endpoint protection
------ is responsible for filtering the traffic flowing in and out of a network based on ‘a set of
security rules’. Firewall