212-89 Practice Test Questions

163 Questions


The message that is received and requires an urgent action and it prompts the recipient to delete certain files or forward it to others is called:


A.

An Adware


B.

Mail bomb


C.

A Virus Hoax


D.

Spear Phishing





C.
  

A Virus Hoax



The flow chart gives a view of different roles played by the different personnel of CSIRT. Identify the incident response personnel denoted by A, B, C, D, E, F and G.



A.

A-Incident Analyst, B- Incident Coordinator, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager


B.

A- Incident Coordinator, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human
Resource, F-Constituency, G-Incident Manager


C.

A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations


D.

A- Incident Manager, B-Incident Analyst, C- Public Relations, D-Administrator, E- Human Resource, F-Constituency, G-Incident Coordinator





C.
  

A- Incident Coordinator, B- Constituency, C-Administrator, D-Incident Manager, E- Human Resource, F-Incident Analyst, G-Public relations



The Malicious code that is installed on the computer without user’s knowledge to acquire information from the
user’s machine and send it to the attacker who can access it remotely is called:


A.

Spyware


B.

Logic Bomb


C.

Trojan


D.

Worm





A.
  

Spyware



Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?


A.

Apply the control


B.

Not to apply the control


C.

Use qualitative risk assessment


D.

Use semi-qualitative risk assessment instead





B.
  

Not to apply the control



The USB tool (depicted below) that is connected to male USB Keyboard cable and not detected by anti-spyware tools is most likely called:





A.

Software Key Grabber


B.

Hardware Keylogger


C.

USB adapter


D.

Anti-Keylogger





B.
  

Hardware Keylogger



The largest number of cyber-attacks are conducted by:


A.

Insiders


B.

Outsiders


C.

Business partners


D.

Suppliers





B.
  

Outsiders



Which test is conducted to determine the incident recovery procedures effectiveness?


A.

Live walk-throughs of procedures


B.

Scenario testing


C.

Department-level test


D.

Facility-level test





A.
  

Live walk-throughs of procedures



The state of incident response preparedness that enables an organization to maximize its potential to use digital evidence while minimizing the cost of an investigation is called:


A.

Computer Forensics


B.

Digital Forensic Analysis


C.

Forensic Readiness


D.

Digital Forensic Policy





C.
  

Forensic Readiness



Incident management team provides support to all users in the organization that are affected by the threat or attack. The organization’s internal auditor is part of the incident response team. Identify one of the responsibilities of the internal auditor as part of the incident response team:


A.

Configure information security controls


B.

Perform necessary action to block the network traffic from suspected intruder


C.

Identify and report security loopholes to the management for necessary actions


D.

Coordinate incident containment activities with the information security officer





C.
  

Identify and report security loopholes to the management for necessary actions



The role that applies appropriate technology and tries to eradicate and recover from the incident is known as:


A.

Incident Manager


B.

Incident Analyst


C.

Incident Handler


D.

Incident coordinator





B.
  

Incident Analyst



The correct sequence of incident management process is:


A.

Prepare, protect, triage, detect and respond


B.

Prepare, protect, detect, triage and respond


C.

Prepare, detect, protect, triage and respond


D.

Prepare, protect, detect, respond and triage





B.
  

Prepare, protect, detect, triage and respond



CERT members can provide critical support services to first responders such as:


A.

Immediate assistance to victims


B.

Consolidated automated service process management platform


C.

Organizing spontaneous volunteers at a disaster site


D.

A + C





D.
  

A + C




Page 4 out of 14 Pages
Previous