When designing the technical solution for a disaster re…
When designing the technical solution for a disaster recovery site, the PRIMARY factor that should be taken
into consideration is the:
Which of the following actions should lake place immedi…
Which of the following actions should lake place immediately after a security breach is reported to an
information security manager?
What is the FIRST action an information security manage…
What is the FIRST action an information security manager should take when a company laptop is reported
stolen?
Emergency actions are taken at the early stage of a dis…
Emergency actions are taken at the early stage of a disaster with the purpose of preventing injuries or loss of
life and:
In the course of responding 10 an information security …
In the course of responding 10 an information security incident, the BEST way to treat evidence for possible
legal action is defined by:
What would be the BEST source?
Evidence from a compromised server has to be acquired for a forensic investigation. What would be the BEST
source?
The next step should be to:
A web server in a financial institution that has been compromised using a super-user account has been
isolated, and proper forensic processes have been followed. The next step should be to:
Detailed business continuity plans should be based PRIM…
Detailed business continuity plans should be based PRIMARILY on:
What is the PRIMARY objective of a post-event review in…
What is the PRIMARY objective of a post-event review in incident response?
Why is "slack space" of value to an i…
Why is “slack space” of value to an information security manager as pan of an incident investigation?