(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests. Mike Chapple
Чтение книги онлайн.

Читать онлайн книгу (ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests - Mike Chapple страница 18

СКАЧАТЬ which phase of the incident response process would an analyst receive an intrusion detection system alert and verify its accuracy?ResponseMitigationDetectionReporting

      29 In what virtualization model do full guest operating systems run on top of a virtualization platform?Virtual machinesSoftware-defined networkingVirtual SANApplication virtualization

      30 During what phase of the incident response process would security professionals analyze the process itself to determine whether any improvements are warranted?Lessons learnedRemediationRecoveryReporting

      31 Which one of the following information sources is most likely to detect a security incident involving unauthorized modification of information by an employee?Intrusion detection systemAntivirus softwareFile integrity monitoring systemFirewall logs

      32 During what phase of incident response is the primary goal to limit the damage caused by an incident?DetectionContainmentEradicationRecovery

      33 Darcy is a computer security specialist who is assisting with the prosecution of a hacker. The prosecutor requests that Darcy give testimony in court about whether, in her opinion, the logs and other records in a case are indicative of a hacking attempt. What type of evidence is Darcy being asked to provide?Expert opinionDirect evidenceReal evidenceDocumentary evidence

      34 Jerome is conducting a forensic investigation and is reviewing database server logs to investigate query contents for evidence of SQL injection attacks. What type of analysis is he performing?Hardware analysisSoftware analysisNetwork analysisMedia analysis

      35 What documentation is typically prepared after a postmortem review of an incident has been completed?A lessons learned documentA risk assessmentA remediation listA mitigation checklist

      36 Ed has been tasked with identifying a service that will provide a low-latency, high- performance, and high-availability way to host content for his employer. What type of solution should he seek out to ensure that his employer’s customers around the world can access their content quickly, easily, and reliably?A hot siteA CDNRedundant serversA P2P CDN

      37 Who is the ideal person to approve an organization’s business continuity plan?Chief information officerChief executive officerChief information security officerChief operating officer

      38 Which one of the following actions is not normally part of the project scope and planning phase of business continuity planning?Structured analysis of the organizationReview of the legal and regulatory landscapeCreation of a BCP teamDocumentation of the plan

      39 Henry’s company is being sued for breach of contract. What type of law will cover this?Civil lawAdministrative lawCriminal lawEthical standards

      40 The forensic investigation that Joanna has conducted is complete, and the report has been provided to organizational leadership in preparation for a human resources action. What should Joanna do once the report has been provided?Delete all files and notes about the forensic case.Notify the subject of the forensic investigation that it is complete.Notify law enforcement that the forensic investigation is complete.Preserve the forensic materials and notes in case they are needed.

      41 Which of the following is not an event that is typically prepared for in an emergency response plan?A supply chain disruptionA pandemicA natural disasterA man-made disaster

      42 Miguel is preparing a crisis management process for his organization. What step will typically come after “Respond” in the following cycle?AnalyzeRecoverEvaluateIdentify

      43 Emma’s organization is planning for natural disasters and wants to have a backup site available to move operations to. What important factor in backup site selection will help Emma avoid a single disaster disrupting operations for her organization?Network bandwidthAvailability of backup powerGeographic locationRisk of natural disasters for the locations

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SEIUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAADIcAgAAAgAA HAJQABBuaWNob2xhc3dlaHJrYW1wHAIFABE5NzgxMTE5ODUyMDcwLnBkZjhCSU0EJQAAAAAAEFp/ /FuhclgliYDm4t7OaAs4QklNBDoAAAAAAOUAAAAQAAAAAQAAAAAAC3ByaW50T3V0cHV0AAAABQAA AABQc3RTYm9vbAEAAAAASW50ZWVudW0AAAAASW50ZQAAAABDbHJtAAAAD3ByaW50U2l4dGVlbkJp dGJvb2wAAAAAC3ByaW50ZXJOYW1lVEVYVAAAAAEAAAAAAA9wcmludFByb29mU2V0dXBPYmpjAAAA DABQAHIAbwBvAGYAIABTAGUAdAB1AHAAAAAAAApwcm9vZlNldHVwAAAAAQAAAABCbHRuZW51bQAA AAxidWlsdGluUHJvb2YAAAAJcHJvb2ZDTVlLADhCSU0EOwAAAAACLQAAABAAAAABAAAAAAAScHJp bnRPdXRwdXRPcHRpb25zAAAAFwAAAABDcHRuYm9vbAAAAAAAQ2xicmJvb2wAAAAAAFJnc01ib29s AAAAAABDcm5DYm9vbAAAAAAAQ250Q2Jvb2wAAAAAAExibHNib29sAAAAAABOZ3R2Ym9vbAAAAAAA RW1sRGJvb2wAAAAAAEludHJib29sAAAAAABCY2tnT2JqYwAAAAEAAAAAAABSR0JDAAAAAwAAAABS ZCAgZG91YkBv4AAAAAAAAAAAAEdybiBkb3ViQG/gAAAAAAAAAAAAQmwgIGRvdWJAb+AAAAAAAAAA AABCcmRUVW50RiNSbHQAAAAAAAAAAAAAAABCbGQgVW50RiNSbHQAAAAAAAAAAAAAAABSc2x0VW50 RiNQeGxAcsAAAAAAAAAAAAp2ZWN0b3JEYXRhYm9vbAEAAAAAUGdQc2VudW0AAAAAUGdQcwAAAABQ Z1BDAAAAAExlZnRVbnRGI1JsdAAAAAAAAAAAAAAAAFRvcCBVbnRGI1JsdAAAAAAAAAAAAAAAAFNj bCBVbnRGI1ByY0BZAAAAAAAAAAAAEGNyb3BXaGVuUHJpbnRpbmdib29sAAAAAA5jcm9wUmVjdEJv dHRvbWxvbmcAAAAAAAAADGNyb3BSZWN0TGVmdGxvbmcAAAAAAAAADWNyb3BSZWN0UmlnaHRsb25n AAAAAAAAAAtjcm9wUmVjdFRvcGxvbmcAAAAAADhCSU0D7QAAAAAAEAEsAAAA
СКАЧАТЬ