Exam 10: Incident and Disaster Response

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Companies should realize that prosecution for possible incidents is a public process.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

The main attraction of ________ is that they provide highly specific information about what happened on a particular host computer.

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

A

One important factor in pushing many organizations to cloud-based hosting is the lower cost than many other alternatives.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

True

A backup facility is usually on the same company premises.

(True/False)
4.7/5
(31)

Successful attacks are commonly called ________.

(Multiple Choice)
4.9/5
(40)

Companies do not need to update their IDS attack signatures as it is done automatically.

(True/False)
4.9/5
(29)

Which of the following is NOT a factor of cloud-based hosting?

(Multiple Choice)
4.8/5
(24)

________ punishments may result in jail time.

(Multiple Choice)
5.0/5
(32)

________ looks specifically at the technical aspects of how a company can get IT back into operation.

(Multiple Choice)
4.9/5
(40)

Each monitoring device has a software agent that collects event data.

(True/False)
4.9/5
(31)

Which of the following is beyond the abilities of CSIRTs?

(Multiple Choice)
4.8/5
(34)

Which of the following is NOT a priority at the beginning of an incident?

(Multiple Choice)
4.8/5
(38)

It's important for a company to realize that a system needs to be better than before an attack so that the attacker cannot come back in.

(True/False)
4.8/5
(34)

In the United States, the main federal law regarding hacking is U.S. ________.

(Multiple Choice)
4.8/5
(38)

Which of the following is NOT one of the four major functions of an IDS?

(Multiple Choice)
4.8/5
(33)

Repair during continuing server operation is ________.

(Multiple Choice)
4.8/5
(36)

In crises, communication within a company is usually enhanced.

(True/False)
4.9/5
(35)

According to the Federal Bureau of Investigation, about ________ of concentrated attacks are successful.

(Multiple Choice)
4.9/5
(37)

________ initiate legal proceedings in civil cases.

(Multiple Choice)
4.8/5
(34)

The Network Time Protocol allows a type of synchronization.

(True/False)
4.8/5
(35)
Showing 1 - 20 of 67
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)