The FIRST priority when responding to a major security …
The FIRST priority when responding to a major security incident is:
The BEST method for detecting and monitoring a hacker’s…
The BEST method for detecting and monitoring a hacker’s activities without exposing information assets to
unnecessary risk is to utilize:
Which of the following actions should be taken when an …
Which of the following actions should be taken when an online trading company discovers a network attack in
progress?
Which of the following would be the GREATEST weakness i…
A company has a network of branch offices with local file/print and mail servers; each branch individually
contracts a hot site. Which of the following would be the GREATEST weakness in recovery capability?
A desktop computer that was involved in a computer secu…
A desktop computer that was involved in a computer security incident should be secured as evidence by:
Which of the following should be determined FIRST when …
Which of the following should be determined FIRST when establishing a business continuity program?
which security should be addressed in the development c…
Which of the following is the FIRST phase in which security should be addressed in the development cycle of a
project?
Which of the following vulnerabilities does il always i…
Simple Network Management Protocol v2 (SNMP v2) is used frequently to monitor networks. Which of the
following vulnerabilities does il always introduce?
Which is the BEST way to identify an application backdoor?
There is reason to believe that a recently modified web application has allowed unauthorized access. Which is
the BEST way to identify an application backdoor?
In order to ensure effective management of business ris…
As an organization grows, exceptions to information security policies that were not originally specified may
become necessary at a later date. In order to ensure effective management of business risks, exceptions to
such policies should be: