Exam 11: Contingency Planning and Networking Incident Response
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
-Uses byte-level striping of data
(Short Answer)
4.9/5
(34)
Incident ____ is the process of evaluating organizational events, determining which events are possible incidents, also called incident candidates, and then determining whether or not the incident candidate is an actual incident or a nonevent, also called a false positive incident candidate.
(Multiple Choice)
4.8/5
(31)
____________________ are the contractual documents guaranteeing certain minimum levels of service provided by vendors.
(Essay)
4.7/5
(34)
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
-A specialized form of disk striping with parity; is not widely used
(Short Answer)
4.9/5
(34)
The ____ review entails a detailed examination of the events that occurred from first detection to final recovery.
(Multiple Choice)
4.8/5
(33)
In some organizations, which two plans are considered to be one plan, known as the Business Resumption Plan?
(Multiple Choice)
4.8/5
(32)
____ planning ensures that critical business functions can continue if a disaster occurs.
(Multiple Choice)
4.8/5
(31)
A(n) ____ is a detailed description of the activities that occur during an attack, including the preliminary indications of the attack as well as the actions taken and the outcome.
(Multiple Choice)
4.9/5
(40)
The identification of an incident begins with the ____________________ - that is, the circumstances that cause the IR team to be activated and the IR plan to be initiated.
(Short Answer)
4.7/5
(34)
Compare the protect and forget strategy with the apprehend and prosecute strategy.
(Essay)
4.9/5
(36)
Match each item with a statement below.
a.RAID Level 0
f.RAID Level 5
b.RAID Level 1
g.RAID Level 6
c.RAID Level 2
h.RAID Level 7
d.RAID Level 3
i.RAID Level 10
e.RAID Level 4
-A proprietary variation on RAID 5 in which the array works as a single virtual drive
(Short Answer)
4.7/5
(40)
According to D. L. Pipkin, ____ is a definite indicator of an actual incident.
(Multiple Choice)
4.9/5
(40)
Which backup method allows for easy full-system restorations (no shuffling through tapes with partial backups on them)?
(Multiple Choice)
4.8/5
(40)
NAS works well with real-time applications because of the latency of the communication methods.
(True/False)
4.9/5
(30)
Incident response focuses on immediate response to small-scale events.
(True/False)
4.9/5
(45)
____ clustering is a more complex model in which all members of a cluster simultaneously provide application services.
(Multiple Choice)
4.9/5
(26)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)