Questions
ayuda
option
My Daypo

ERASED TEST, YOU MAY BE INTERESTED ONSec 2.4 - 2.9

COMMENTS STATISTICS RECORDS
TAKE THE TEST
Title of test:
Sec 2.4 - 2.9

Description:
Sec 2.4 - 2.9

Author:
BA
(Other tests from this author)

Creation Date:
05/06/2018

Category:
Others

Number of questions: 25
Share the Test:
Facebook
Twitter
Whatsapp
Share the Test:
Facebook
Twitter
Whatsapp
Last comments
No comments about this test.
Content:
What policy does this describe? Controlling and managing the evidence to maintain integrity. Document everyone who contacts the evidence.
The attacker thinks they’re on a real system, but they’re not. Mock Spoof Phantom Sandbox.
In incident management procedures, who or what are the following points referring to? • Very specific tasks should be done • Objective is to contain the damage • Don’t disturb the environment • Get the right people in place before poking around • Follow the escalation policy.
Credit monitoring may be required when _____ data is breached.
What compliance law pertains to extensive standards for storage, use, and transmission of health care information.
When monitoring and HVAC system, overcooling can cause _____.
When monitoring and HVAC system, too dry air can lead to ______.
For cooling purposes, server racks should ______ each other. face face away from.
Hardware locks: Electronic, token-based, biometrics, multi-factor smart card are all examples of physical security. True False.
Physical security: Multiple doors that only unlock one at a time.
What control type identifies and records any intrusion attempt? detective administrative technical deterrent.
What control type determines how people act? administrative detective deterrent compensating.
What is the formula for Quantitative Risk Assessment?.
What Risk Management best practice takes advantage of geographically diverse areas? Disaster recovery Business continuity Succession planning Critical systems.
Classified is a higher level of clearance than confidential. True False.
System timestamps are used in forensics: Windows Unix.
System redundancy lends itself to: Fault tolerance Compatibility Confidentiality Safety.
Spares are systems used as backups. Cold spare Warm spare Hot spare.
Hardware is waiting, you bring the data Cold site Warm site Hot site.
Which RAID type provides fast speed, but no redundacy? 0 1 5 1+0.
Which Raid type requires twice the disk space? 0 1 5 1+0.
Which type of RAID does striping, but provides redundancy? 0 1 5 1+0.
A control that is commonly associated with hiding information in an image: Steganography Encryption Hashing Redundancy.
What Security goal does the following statement describe? Data is stored and transferred as intended. Any modification to the data would be identified. Integrity Confidentiality Availability Safety.
Name the 3 main security goals:.
Report abuse Consent Terms of use