Exam 10: Planning for Contingencies
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Which is the first step in the contingency planning process among the options listed here?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
C
Which document must be changed when evidence changes hands or is stored?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
A
At what point in the incident lifecycle is the IR plan initiated?
Free
(Multiple Choice)
4.8/5
(28)
Correct Answer:
C
Which of the following is a possible indicator of an actual incident?
(Multiple Choice)
4.8/5
(37)
In which type of site are no computer hardware or peripherals provided?
(Multiple Choice)
4.9/5
(34)
In a warm site,all services and communications links are fully configured and the site can be fully functional within minutes.
(True/False)
4.8/5
(37)
Which of the following is an approach available to an organization as an overall philosophy for contingency planning reactions?
(Multiple Choice)
4.9/5
(36)
The ____________________ plan is a detailed set of processes and procedures that anticipate,detect,and mitigate the effects of an unexpected event that might compromise information resources and assets.
(Short Answer)
4.9/5
(31)
After an incident,but before returning to its normal duties,the CSIRT must do which of the following?
(Multiple Choice)
4.8/5
(35)
Which of the following is a definite indicator of an actual incident?
(Multiple Choice)
4.8/5
(34)
Which of the following is usually conducted via leased lines or secure Internet connections whereby the receiving server archives the data as it is received?.
(Multiple Choice)
4.9/5
(31)
What is the final stage of the business impact analysis when using the NIST SP 800-34 approach?
(Multiple Choice)
4.8/5
(42)
A(n)____________________ occurs when an attack affects information resources and/or assets,causing actual damage or other disruptions.
(Short Answer)
4.9/5
(41)
In digital forensics,all investigations follow the same basic methodology.Which of the following should be performed first in a digital forensics investigation?
(Multiple Choice)
4.9/5
(30)
In most organizations,the COO is responsible for creating the IR plan.
(True/False)
4.8/5
(38)
____________________ planning ensures that critical business functions can continue if a disaster occurs.
(Short Answer)
4.8/5
(36)
Patch and proceed is an organizational CP philosophy that focuses on the defense of information assets and preventing reoccurrence rather than the attacker's identification and prosecution.
(True/False)
4.8/5
(33)
A(n)wrap-up review is a detailed examination and discussion of the events that occurred during an incident or disaster,from first detection to final recovery.
(True/False)
5.0/5
(40)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)