In designing a backup strategy that will be consistent …
In designing a backup strategy that will be consistent with a disaster recovery strategy, the PRIMARY factor to
be taken into account will be the:
When designing the technical solution for a disaster re…
When designing the technical solution for a disaster recovery site, the PRIMARY factor that should be taken
into consideration is the:
Which of the following actions should lake place immedi…
Which of the following actions should lake place immediately after a security breach is reported to an
information security manager?
What is the FIRST action an information security manage…
What is the FIRST action an information security manager should take when a company laptop is reported
stolen?
Emergency actions are taken at the early stage of a dis…
Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of
life and:
In the course of responding 10 an information security …
In the course of responding 10 an information security incident, the BEST way to treat evidence for possible
legal action is defined by:
What would be the BEST source?
Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST
source?
The next step should be to:
A web server in a financial institution that has been compromised using a super-user account has been
isolated, and proper forensic processes have been followed. The next step should be to:
Detailed business continuity plans should be based PRIM…
Detailed business continuity plans should be based PRIMARILY on:
What is the PRIMARY objective of a post-event review in…
What is the PRIMARY objective of a post-event review in incident response?