Exam 18: Incident Handling

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____________________ in a computer-security environment is an event that tests the security solutions in place on a network or, in the case of a stand-alone machine, on that machine itself.

Free
(Short Answer)
4.8/5
(38)
Correct Answer:
Verified

incident

Defaced-page incidents result in loss of revenue, reputation, and morale of a company.

Free
(True/False)
4.8/5
(37)
Correct Answer:
Verified

True

____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.

Free
(Short Answer)
4.9/5
(30)
Correct Answer:
Verified

System-monitoring

Statistics reveal that most incidents of fraud involve "outside" individuals.

(True/False)
4.9/5
(25)

____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.

(Multiple Choice)
4.8/5
(43)

The skills represented in an emergency response team always belong to the IT department.

(True/False)
4.8/5
(36)

What are the key phases of incident handling?

(Essay)
4.8/5
(22)

In UNIX and Linux, ____________________ is a dumping ground for automated CRON jobs, as well as various logged functions by applications that do not maintain their own log files.

(Short Answer)
4.8/5
(37)

What are some of the most common events that may indicate an attack in progress?

(Essay)
4.8/5
(30)

This type of incident means an attacker has hacked your Web server.

(Multiple Choice)
4.9/5
(31)

The most common incidents that affect network security are attacks from malicious code and ____.

(Multiple Choice)
4.7/5
(37)

____ attacks send input data of a greater size than the capacity of an unchecked variable in the server application.

(Multiple Choice)
4.8/5
(38)

What are some of the most common types of incidents that can occur on a network or a computer?

(Essay)
4.7/5
(32)

____ attacks send a large quantity of packets to a server so that resources are overutilized.

(Multiple Choice)
4.9/5
(26)

How one approaches incident detection can seriously impact the number and kinds of incidents that are detectable.

(True/False)
4.8/5
(32)

____________________ is the most basic form of a DoS attack. Large numbers of requests are sent to the server. This results in the slowing down or failure of the network.

(Short Answer)
4.9/5
(30)

The chief difference between a worm and a virus is that ____________________ replicate in a network.

(Short Answer)
4.8/5
(39)

Organizations that handle and document incidents may be less likely to have repeat occurrences.

(True/False)
4.9/5
(39)

What are some of the reasons to develop effective incident handling policies?

(Essay)
4.8/5
(32)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)