Exam 8: Reacting to a Cyber Incident: Communication and Incident Recovery
Exam 1: Applying Environmental Reconnaissance9 Questions
Exam 2: Analyzing Network Reconnaissance10 Questions
Exam 3: Strengthening the Network10 Questions
Exam 4: Exploring Penetration Testing10 Questions
Exam 5: Scanning for Vulnerabilities10 Questions
Exam 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities10 Questions
Exam 7: Reacting to a Cyber Incident: Impact and Forensics10 Questions
Exam 8: Reacting to a Cyber Incident: Communication and Incident Recovery10 Questions
Exam 9: Reacting to a Cyber Incident: Analyzing Common Symptoms10 Questions
Exam 10: Security Structures and Identity and Access Management10 Questions
Exam 11: Defense in Depth, Software Development, and Data Analytics10 Questions
Select questions type
What federal legislation protects user data in Canada?
Free
(Short Answer)
4.8/5
(29)
Correct Answer:
The Personal Information Protection and Electronic Documents Act (PIPEDA)
A review of the change control process and update to the incident response plan should result in a formal written document known as a ________________, which should include all weaknesses that were uncovered and the changes made to address them.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
Lessons learned report
Which of the following containment techniques permits the device to continue functioning and redirects all network communication to a sinkhole so that evidence may continue to be gathered and malware analyzed?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Which of the following U.S. laws helps to protect healthcare information?
(Multiple Choice)
4.8/5
(40)
What is the term for slicing a hard drive into small pieces using 40,000 pounds of force?
(Short Answer)
4.8/5
(29)
Due to a lack of comprehensive federal regulations for data breach notification, many states have amended their own laws, and no two state laws are the same.
(True/False)
4.8/5
(30)
After a hard drive has been sanitized, what process can be used to restore the drive by installing the operating system, application programs, and data files?
(Multiple Choice)
4.9/5
(50)
Which of the following companies had 3 billion of its user accounts hacked in 2013 and 2014?
(Multiple Choice)
4.9/5
(38)
_______________ are people with an interest or concern in the organization's actions; unless necessary, communication about a cyber incident should be restricted to them.
(Short Answer)
4.8/5
(38)
Which of the following is not considered a difficulty in determining whether a cyber incident has occurred?
(Multiple Choice)
4.8/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)